-
Notifications
You must be signed in to change notification settings - Fork 2
/
CVE-2019-13101
60 lines (40 loc) · 2.18 KB
/
CVE-2019-13101
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Description:
A remote vulnerability was discovered on D-Link DIR-600M Wireless N 150 Home Router in multiple respective firmware versions.
The vulnerability provides unauthenticated remote access to the router's WAN configuration page i.e. "wan.htm", which leads to
disclosure of sensitive user information including but not limited to PPPoE, DNS configuration etc, also allowing to change
the configuration settings as well.
------------------------------------------------------------------------------------
Vulnerability Type:
Incorrect Access Control
------------------------------------------------------------------------------------
Vendor of Product:
D-Link
------------------------------------------------------------------------------------
Affected Product Code Base:
DIR-600M Firmware - 3.02, 3.03, 3.04, 3.06
------------------------------------------------------------------------------------
Attack Type:
Remote
------------------------------------------------------------------------------------
Impact:
Denial of Service => true
------------------------------------------------------------------------------------
Impact:
Information Disclosure => true
------------------------------------------------------------------------------------
Attack Vectors:
WAN configuration page "wan.htm" on D-Link DIR-600M devices with firmware 3.02, 3.03, 3.04 and 3.06 can be accessed directly
without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the
data fields of page e.g.: "<dlink_600m_router_ip>/wan.htm"
------------------------------------------------------------------------------------
CVE Reference:
CVE-2019-13101
------------------------------------------------------------------------------------
Credits:
This security vulnerability was found by Devendra Singh Solanki (https://twitter.com/_d0x0_)
------------------------------------------------------------------------------------
Reference:
https://github.com/d0x0/D-Link-DIR-600M
https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf
https://us.dlink.com/en/security-advisory
https://www.dlink.com/en/security-bulletin