Port 8899 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
8899 |
tcp |
qnap |
QNAP NAS - Real-time Remote Replication Server (RTRR Server) runs a service on port 8899 by default. QNAP NAS uses the following ports:
Web server: 80,8081 TCP and 443,8080 TCP (web admin)
FTP/SFTP/SSH: 20,21,22 TCP and 13131 TCP (telnet)
Remote Replication: 873,8899 TCP
VPN server: 1723 TCP (PPTP), 1194 UDP (OpenVPN)
CloudLink: port 20001 UDP (optional, only required for access without manual port forwarding)
An unspecified vulnerability allows sending crafted client requests to OracleVM ovs-agent over 8899/TCP that could result in command injection with root privileges on the system.
References: [XFDB-62482]
Network port 8899 open in WiFi firmware of BCC101/BCC102/BCC50 products, that allows an attacker to connect to the device via same WiFi network.
References: [CVE-2023-49722]
Malware that uses this port: Last trojan
ospf-lite (IANA official) |
SG
|
8899 |
udp |
malware |
Backdoor.Win32.Singu.a / Remote Stack Buffer Overflow (UDP Datagram) - the malware listens on UDP ports 2211 and 8899. Third-party attackers who can reach an infected host can send a specially crafted UDP packet to port 8899, triggering a classic buffer overflow overwriting ECX and EIP registers.
References: [MVID-2021-0221] |
SG
|
8899 |
tcp,udp |
ospf-lite |
ospf-lite, registered 2008-01-07 |
IANA
|
|
3 records found
Related ports: 873 1194 8081 13131 20001
|