Plex Server vulnerability (UDP 32414 / 32410)

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Author Message

Joined: 17 Nov 2016
Posts: 91

PostPosted: Sun Feb 14, 2021 8:55    Post subject: Plex Server vulnerability (UDP 32414 / 32410) Reply with quote
Hi Plex server has a vulnerability on ports 32414 and 32410.
If I I enter a simple iptables command to drop connections on ports 32410 32414 would that do the trick ?

iptables -I FORWARD -p tcp --dport 32414 -j DROP
iptables -I FORWARD -p tcp --dport 32410 -j DROP

related article:

Joined: 16 Nov 2015
Posts: 5501
Location: UK, London, just across the river..

PostPosted: Sun Feb 14, 2021 10:58    Post subject: Reply with quote
those lines will cut off all WAN communication for those ports...and if plex is actively using those, it may not work any more as it should...sry but im not a 'plex' user, you can use MiniDLNA instead, as it runs on router level too....
TP-Link WR740Nv1 ---DD-WRT 51440 WAP
TP-Link WR1043NDv2 -DD-WRT 51530 Gateway/DoT DNS,AP Isolation,Ad-Block,Firewall,Forced DNS,VPN,VLAN
TP-Link WR1043NDv2 -DD-WRT 51440 Gateway/DoT DNS,Ad-Block,Firewall,Forced DNS,x3 VLAN(no-wifi)
TP-Link WR1043NDv2 -Gargoyle OS 1.13.0 AP,DNS,QoS,Quotas
Netgear R7800 --DD-WRT 51530 Gateway/DoT DNS,AD-Block,AP&Net Isolation,VLAN's,Firewall,Vanilla
Netgear R9000 --DD-WRT 51440 Gateway/DoT DNS,AD-Block,AP Isolation,Firewall,Forced DNS, 2,4Ghz only,Vanilla
Netgear R7000 ---DD-WRT 51440 Gateway/DoT DNS,AD-Block,Firewall,Forced DNS,VLAN's,VPN (wi-fi off)
Stubby for DNS over TLS I DNSCrypt v2 by mac913

Last edited by Alozaros on Sun Feb 14, 2021 13:29; edited 1 time in total

Joined: 08 May 2018
Posts: 13162
Location: Texas, USA

PostPosted: Sun Feb 14, 2021 11:40    Post subject: Reply with quote
I think the premise of the OP was to restrict access to the Plex server from the WAN. Plex is available on many platforms these days. The thing to do is to see if those ports are open from the WAN side with the Plex server running, then figure out what iptables rules work. Isn't the forward chain for sending to the outside world and vice-versa? AFAIK, Plex will run on the LAN without any internet connection whatsoever.
"Life is but a fleeting moment, a vapor that vanishes quickly; All is vanity"
Contribute To DD-WRT
Pogo - A minimal level of ability is expected and needed...
At some point, people just get plain tired of this place.
Because they are tired of bottom-feeders and the same old hat.

Linux User #377467 /

Joined: 18 Sep 2010
Posts: 9157

PostPosted: Sun Feb 14, 2021 11:54    Post subject: Reply with quote
Those ports being actively blocked is only relevant if the plex server on the LAN is being forwarded to from the router, whether that's due to UPnP being enabled, or you having configured port forwarding on the GUI.

IOW, any given exploit for some internal device on the LAN is only vulnerable to the internet to the extent that device is actually accessible from the internet.

This is one of the reasons I don't leave UPnP enabled. I don't want LAN clients opening ports on the router behind my back.

_________________ (UPDATED!) * (UPDATED!) * * * * * * * * (NEW!)
Display posts from previous:    Page 1 of 1
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT


Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum