vendor:
DIR-300
by:
outlaw.dll
6,8
CVSS
MEDIUM
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: DIR-300
Affected Version From: 1.04
Affected Version To: 1.04
Patch Exists: NO
Related CWE: N/A
CPE: h:d-link:dir-300
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2010
D-Link DIR-300 CSRF Vuln. (Change Admin Account Settings) PoC Exploit
This PoC exploit enables remote management for a specific IP address on the D-Link DIR-300 router with firmware version 1.04. No need for an administrator to be logged in. The exploit is tested on Windows 7 Ultimate with Google Chrome, but will work on any other OS.
Mitigation:
Implementing CSRF protection mechanisms, such as anti-CSRF tokens, can help mitigate the risk of CSRF attacks.