Oct 8, 2018 - MikroTik Router's WinBox Vulnerability is Critical Than Previously Thought, New RCE PoC Exploit Turns 'Medium' MikroTik Router. May 11, 2013 - Mikrotik RouterOS GUI Configurator (wine). Git Clone URL: (read-only). Package Base: winbox.
Welcome to the Chocolatey Community Package Repository! The packages found in this section of the site are provided, maintained, and moderated by the community. Moderation Every version of each package undergoes a rigorous moderation process before it goes live that typically includes:., consistency, and. Human moderators who give final review and sign off More detail at. Organizational Use If you are an organization using Chocolatey, we want your experience to be fully reliable. Due to the nature of this publicly offered repository, cannot be guaranteed. Packages offered here are subject to distribution rights, which means they may need to reach out further to the internet to the official locations to download files at runtime.
Fortunately, distribution rights do not apply for internal use. With any edition of Chocolatey (including the free open source edition), you can and cache or existing community packages. Disclaimer Your use of the packages on this site means you understand they are not supported or guaranteed in any way. Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! This package was approved as on 1/29/2017. WinBox is a small utility that allows administration of Mikrotik RouterOS using a fast and simple GUI.
It is a native Win32 binary, but can be run on Linux and Mac OSX using Wine. All WinBox interface functions are as close as possible to Console functions. Some of advanced and system critical configurations are not possible from WinBox, like MAC address change on an interface. Note: WinBox is obviously freeware, but no details about the license are available either on the application website or in the application itself.
To install WinBox, run the following command from the command line or from PowerShell. Discussion for the WinBox Package Ground rules:. This discussion is only about WinBox and the WinBox package.
If you have feedback for Chocolatey, please contact the. This discussion will carry over multiple versions.
If you have a comment about a particular version, please note that in your comments. The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to. If you still hear nothing back, please follow the. Tell us what you love about the package or WinBox, or tell us what needs improvement. Share your experiences with the package, or extra configuration or gotchas that you've found. If you use a url, the comment will be flagged for moderation until you've been whitelisted.
Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
24th Feb, 2019 Press Release. 25 February 2019 Riga, Latvia - MikroTik is announcing a collaboration with Facebook to build high-speed connectivity solutions with Terragraph, helping to accelerate the adoption of 60 GHz fixed wireless access technologies to deliver gigabit services and connect more people, faster. The 60 GHz band allows high-speed broadband 22nd Feb, 2019 On February 21, a new CVE, describing a vulnerability, which allows to proxy a TCP/UDP request through the routers Winbox port, if it's open to the internet. Tenable had previously contacted MikroTik about this issue, so a fix has already been released on February 11, 2019 in 9th Oct, 2018 A cybersecurity researcher from Tenable Research has released a new proof-of-concept (PoC) RCE attack for an old directory traversal vulnerability that was found and patched within a day of its discovery in April this year, the new attack method found by Tenable Research exploits the same vulnerability, but takes it 23rd Aug, 2018 We have released a new version in the RouterOS bugfixes-only channel. The bugfixes-only channel is considered the 'stable' branch of RouterOS releases and is updated rarely, only when important fixes must be included.
This is the most stable and most tested of the RouterOS release channels.!) security - fixed 23rd Aug, 2018 MikroTik was contacted by Tenable Inc. Who had discovered several issues in RouterOS web server. The issues only affect authenticated users, meaning, to exploit them, there must be a known username and password on the device. Your data, access to the system and configuration are not under risk. All the 9th Aug, 2018 It has come to our attention that a new way of brute force attack based on WPA2 standard using PMKID has come to light. This attack actually is a brute force attack on WPA2 preshared key.
The reason this attack is considered effective is because it can be performed offline 30th May, 2018 This post summerizes the facts around the in RouterOS which was published by Wikileaks as part of the Vault 7 document release. The vulnerability affected the RouterOS webfig configuration interface, if no firewall was put in place to protect it. MikroTik fixed the vulnerability in the 25th Mar, 2018 This post summarises the Winbox server vulnerability in RouterOS, discovered and fixed in RouterOS on April 23, 2018. Note that although Winbox was used as point of attack, the vulnerabilitty was in RouterOS. This issue was later assigned a universal identifier CVE-2018-14847. How it works: The vulnerability allowed a special.