Plugins Database As of 11-20-2019

D-Link DIR Devices Information Disclosure Vulnerability (October 2019)

Web application abuses
Impact by CVSS Score
  • ID: 1.3.6.1.4.1.25623.1.0.113547

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
Remote Vulnerability

Solution Type:
None Available

Summary:
Multiple D-Link DIR devices are prone to an information disclosure vulnerability.

Detection Method:
Tries to read administrative credentials.

Technical Details:
Sending a POST request with the content 'SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a' to /getcfg.php allows unauthenticated user to access sensitive information.

Impact:
Successful exploitation would allow an attacker to acquire administrative credentials and consequently gain control over the router remotely.

Affected Versions:
D-Link DIR-868L B1 through firmware version 2.03 and D-Link DIR-817LW A1 through firmware version 1.04. Other devices might also be affected.

Recommendations:
No known solution is available as of 24th October, 2019. Information regarding this issue will be updated once solution details are available.

Search
Severity
High
CVSS Score
10.0
Published
2019-10-24 08:50:00
Modified
2019-10-24 09:31:45
CVE
CVE-2019-17506

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.