D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 do not sufficiently protect administrator credentials. The tools_admin.asp page discloses the administrator password in base64 encoding in the returned web page. A remote attacker with access to this page (potentially through a authentication bypass such as CVE-2017-3191) may obtain administrator credentials for the device.
References
Configurations
History
21 Nov 2024, 03:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/123292 - Issue Tracking, Third Party Advisory, VDB Entry | |
References | () https://www.kb.cert.org/vuls/id/553503 - Issue Tracking, Third Party Advisory, US Government Resource | |
References | () https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ - Third Party Advisory | |
References | () https://www.wilderssecurity.com/threads/d-link-dir-130-and-dir-330-are-vulnerable-to-authentication-bypass-and-do-not-protect-credentials.392703/ - Issue Tracking, Third Party Advisory |
Information
Published : 2017-12-16 02:29
Updated : 2024-11-21 03:25
NVD link : CVE-2017-3192
Mitre link : CVE-2017-3192
CVE.ORG link : CVE-2017-3192
JSON object : View
Products Affected
d-link
- dir-330_firmware
- dir-130_firmware
dlink
- dir-330
- dir-130
CWE
CWE-522
Insufficiently Protected Credentials