vendor:
DSL2750U
by:
Mohammed Hadi (HadiMed)
8,8
CVSS
HIGH
Command Injection
78
CWE
Product Name: DSL2750U
Affected Version From: 1.6
Affected Version To: 1.6
Patch Exists: YES
Related CWE: N/A
CPE: h:dlink:dsl2750u
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2021
Dlink DSL2750U – ‘Reboot’ Command Injection
A vulnerability in the Dlink DSL2750U router version 1.6 allows an attacker to inject a malicious reboot command. This is possible due to the router's tftp server accepting the cfg.xml file blindly. An attacker can craft a cfg.xml file with a malicious username and password, and then send it to the router via tftp. Once the router has accepted the file, the attacker can then send a POST request with the malicious reboot command, using the malicious username and password, and the sessionid extracted from the previous request. This will cause the router to reboot, allowing the attacker to gain access.
Mitigation:
Ensure that the router is running the latest version of the firmware, and that all security patches are applied.