The Web management interface of multiple routers of D-LINK (youxun), a famous international network equipment manufacturer, has a verification bypass vulnerability, which may cause unauthorized users to browse and modify the management configuration of the router. In addition, the CSRF vulnerability may also be exploited to modify server configurations.
[+] Info:
~~~~~~~~~
Multiple D-Link Router Authentication Bypass Vulnerabilities
# Date: 12-01-2011
# Author: Craig Heffner,/dev/ttyS0
# Firmware Link: The http://www.dlink.co.uk/
# Firmware Version (s): All
# Tested on: DIR-300, DIR-320, DIR-615 revD
[+] Poc:
~~~~~~~~~
The following example URL will allow access to the routers main administrative Web page without authentication:
Http: // 192.168.0.1/bsc_lan.php? NO_NEED_AUTH = 1 & AUTH_GROUP = 0
For a more detailed description of the vulnerability, see: http://www.devttys0.com/wp-content/uploads/2010/12/dlink_php_vulnerability.pdf.
Note that this vulnerability was independently discovered in the DIR-300 and subsequently reported by Karol Celin on 09-Nov-2010 [1].
[+] Reference:
~~~~~~~~~
Http://www.securityfocus.com/archive/1/514687/30/120/threaded