D-Link DSL 2730-U IN_1.10 and IN_1.11 and DIR-600M 3.04 devices have the domain.name string in the DNS resolver search path by default, which allows remote attackers to provide valid DNS responses (and also offer Internet services such as HTTP) for names that otherwise would have had an NXDOMAIN error, by registering a subdomain of the domain.name domain name.
References
Link | Resource |
---|---|
https://harigovind.org/articles/who-is-hijacking-my-nxdomains/ | Exploit Third Party Advisory |
https://harigovind.org/articles/who-is-hijacking-my-nxdomains/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://harigovind.org/articles/who-is-hijacking-my-nxdomains/ - Exploit, Third Party Advisory |
Information
Published : 2020-06-08 20:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-13960
Mitre link : CVE-2020-13960
CVE.ORG link : CVE-2020-13960
JSON object : View
Products Affected
dlink
- dir-600m_firmware
- dsl-2730u_firmware
- dir-600m
- dsl-2730u
CWE