D-Link DIR Devices Information Disclosure Vulnerability (October 2019)

Published: 2019-10-24 08:50:00
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
Remote Vulnerability

Solution Type:
None Available

Summary:
Multiple D-Link DIR devices are prone to an information disclosure vulnerability.

Detection Method:
Tries to read administrative credentials.

Technical Details:
Sending a POST request with the content 'SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a' to /getcfg.php allows unauthenticated user to access sensitive information.

Impact:
Successful exploitation would allow an attacker to acquire administrative credentials and consequently gain control over the router remotely.

Affected Versions:
D-Link DIR-868L B1 through firmware version 2.03 and D-Link DIR-817LW A1 through firmware version 1.04. Other devices might also be affected.

Recommendations:
No known solution is available as of 24th October, 2019. Information regarding this issue will be updated once solution details are available.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-17506

CVE Analysis

https://www.mageni.net/cve/CVE-2019-17506

References:

https://github.com/dahua966/Routers-vuls/blob/master/DIR-868/name%26passwd.py

Severity
High
CVSS Score
10.0
Published
2019-10-24
Modified
2019-10-24
Category
Web application abuses

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.