There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.
References
Link | Resource |
---|---|
https://github.com/dahua966/Routers-vuls/blob/master/DIR-868/name%26passwd.py | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-10-11 20:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-17506
Mitre link : CVE-2019-17506
CVE.ORG link : CVE-2019-17506
JSON object : View
Products Affected
dlink
- dir-868l_b1_firmware
- dir-817lw_a1
- dir-817lw_a1_firmware
- dir-868l_b1
CWE
CWE-306
Missing Authentication for Critical Function