vendor:
DIR-600M
by:
Devendra Singh Solanki
9.8
CVSS
CRITICAL
Incorrect Access Control
CWE
Product Name: DIR-600M
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2019-13101
CPE:
Tags: packetstorm,edb,cve,cve2019,dlink,router,iot
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://github.com/d0x0/D-Link-DIR-600M, https://www.exploit-db.com/exploits/47250, https://nvd.nist.gov/vuln/detail/CVE-2019-13101, https://us.dlink.com/en/security-advisory, http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html
Nuclei Metadata: {'max-request': 1, 'vendor': 'dlink', 'product': 'dir-600m_firmware'}
Platforms Tested:
2019
CVE-2019-13101 D-Link DIR-600M Incorrect Access Control
This module attempts to find D-Link router DIR-600M which is vulnerable to Incorrect Access Control. The vulnerability exists in wan.htm, which is accessible without authentication. This vulnerability can lead an attacker to manipulate WAN settings. This module has been tested successfully on Firmware Version 3.01, 3.02, 3.03, 3.04, 3.05, 3.06.
Mitigation:
Unknown