Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
D-Link-DIR-600M/CVE-2019-13101
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
60 lines (40 sloc)
2.18 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Description: | |
| A remote vulnerability was discovered on D-Link DIR-600M Wireless N 150 Home Router in multiple respective firmware versions. | |
| The vulnerability provides unauthenticated remote access to the router's WAN configuration page i.e. "wan.htm", which leads to | |
| disclosure of sensitive user information including but not limited to PPPoE, DNS configuration etc, also allowing to change | |
| the configuration settings as well. | |
| ------------------------------------------------------------------------------------ | |
| Vulnerability Type: | |
| Incorrect Access Control | |
| ------------------------------------------------------------------------------------ | |
| Vendor of Product: | |
| D-Link | |
| ------------------------------------------------------------------------------------ | |
| Affected Product Code Base: | |
| DIR-600M Firmware - 3.02, 3.03, 3.04, 3.06 | |
| ------------------------------------------------------------------------------------ | |
| Attack Type: | |
| Remote | |
| ------------------------------------------------------------------------------------ | |
| Impact: | |
| Denial of Service => true | |
| ------------------------------------------------------------------------------------ | |
| Impact: | |
| Information Disclosure => true | |
| ------------------------------------------------------------------------------------ | |
| Attack Vectors: | |
| WAN configuration page "wan.htm" on D-Link DIR-600M devices with firmware 3.02, 3.03, 3.04 and 3.06 can be accessed directly | |
| without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the | |
| data fields of page e.g.: "<dlink_600m_router_ip>/wan.htm" | |
| ------------------------------------------------------------------------------------ | |
| CVE Reference: | |
| CVE-2019-13101 | |
| ------------------------------------------------------------------------------------ | |
| Credits: | |
| This security vulnerability was found by Devendra Singh Solanki (https://twitter.com/_d0x0_) | |
| ------------------------------------------------------------------------------------ | |
| Reference: | |
| https://github.com/d0x0/D-Link-DIR-600M | |
| https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf | |
| https://us.dlink.com/en/security-advisory | |
| https://www.dlink.com/en/security-bulletin |