Skip to content
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
IoT_Vul/D-Link/DIR-890L/Auth bypass/
IoT_Vul/D-Link/DIR-890L/Auth bypass/

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 

phpcgi

phpcgi is responsible for processing requests to .php, .asp and .txt pages. Also, it checks whether a user is authorized or not. Nevertheless, if a request is crafted in a proper way, an attacker can easily bypass authorization and execute a script that returns a login and password to a router.

Affected version

FW1.10 A1

Vulnerability

D-Link DIR-890L DIR890L FW1.10 A1 is vulnerable to Authentication Bypass via phpcgi. The file is responsible for checking user authorization and processing requests to .php, .asp and .txt pages. The attack can set up the request to bypass authorization checks. The malicious request can then execute the scripts to return login credentials to the router. image image

ExP

https://github.com/Zarathustra-L/IoT_Vul/blob/main/D-Link/DIR-890L/Auth bypass/phpcgi.py