Port 8291 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
8291 |
tcp |
mikrotik |
MikroTik RouterOS uses the following ports:
5678/udp - Mikrotik Neighbor Discovery Protocol
6343/tcp - Default OpenFlow port
8080/tcp - HTTP Web Proxy
8291/tcp - Winbox GUI
8728/tcp - API
8729/tcp - API-SSL
20561/udp - MAC Winbox GUI
RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning.
References: [CVE-2019-3978], [XFDB-170447] |
SG
|
8291 |
tcp |
|
Winbox - Default on a MikroTik RouterOS for a Windows application used to administer MikroTik RouterOS (unofficial) |
Wikipedia
|
8283-8291 |
tcp,udp |
|
Unassigned |
IANA
|
8150-8350 |
tcp,udp |
applications |
Y-cam Wireless IP Camera |
Portforward
|
|
4 records found
Related ports: 8728 8729 20561
|