CVE-2019-17507 D-Link DIR-816 Router Authentication Bypass Vulnerability

 Introduction

Management pages of D-Link DIR-816 A1 1.06 devices can be accessed without authentication via a client that ignores the 'top.location.href = "/dir_login.asp"' line in a .asp file. Steps to exploit this vulnerability using Burp Suite are given below.

Steps

1. Open the login page of router in Burp Suite browser.

2. Disable HTTP request interception by going to Proxy > Options tab of Burp Suite and uncheck Intercept requests based on following rules checkbox.


3. Enable HTTP server response interception by checking Intercept responses based on the following rules checkbox.


4. Turn on intercept in Proxy > Intercept tab and go to URL http://targetip/d_status.asp. From all the intercepted responses delete the line 'top.location.href = "/dir_login.asp";'


All the router management pages can be accessed by removing the line 'top.location.href = "/dir_login.asp;"' from the responses.

Automation

To automatically delete the line  'top.location.href = "/dir_login.asp;"' from all the responses go to Proxy > Options > Match and Replace section and add a rule as given in figure below.

Video



Comments

Popular posts from this blog

Extract / Create Cramfs File System from Ubuntu 20.04

Firmadyne Installation & Emulation of Firmware

Dump memory to file from U-Boot console using Memory Display (md) log