Overview
Imported from the upstream repository ea/nmap-scripts. Detects a firmware backdoor on some Tenda routers by connecting to a UDP port 7329 and executing a command. By default, it executes /bin/ls and checks for the expected output. Some of the vulnerable routers are W302R and W330R as well as re-branded models, such as the Medialink MWN-WAPR150N. They all use the same �w302r_mfg� magic packet string. Other Tenda routers are possibly affected. Discovered by Craig of /dev/ttyS0 (http://www.devttys0.com/). Reference: http://www.devttys0.com/2013/10/from-china-with-love/ List of other possibly affected firmware versions: http://ea.github.io/blog/2013/10/18/tenda-backdoor/