An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only "User" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain "Admin" rights due to the admin password being displayed in XML.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Aug/45 | Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/45306/ | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Aug/45 | Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/45306/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/Aug/45 - Mailing List, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/45306/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-08-29 19:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12710
Mitre link : CVE-2018-12710
CVE.ORG link : CVE-2018-12710
JSON object : View
Products Affected
dlink
- dir-601
- dir-601_firmware
CWE
CWE-319
Cleartext Transmission of Sensitive Information