ID

VAR-E-201303-0485


CVE

cve_id:CVE-2013-2271

Trust: 2.7

sources: PACKETSTORM: 120613 // EXPLOIT-DB: 24563 // EDBNET: 46653 // EDBNET: 20349

EDB ID

24563


TITLE

D-Link DSL-2740B ADSL Router - Authentication Bypass - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 24563

DESCRIPTION

D-Link DSL-2740B ADSL Router - Authentication Bypass. CVE-2013-2271CVE-90822 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 24563

AFFECTED PRODUCTS

vendor:d linkmodel:dsl-2740b adsl routerscope: - version: -

Trust: 1.0

vendor:d linkmodel:dsl-2740b authenticationscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 120613 // EXPLOIT-DB: 24563

EXPLOIT

+------------------------------------------------------------------------------------------------------------------------------------------+
# Exploit Title : D-Link DSL-2740B (ADSL Router) Authentication Bypass
# Date : 10-02-2013
# Author : Ivano Binetti (http://ivanobinetti.com)
# Vendor site : http://www.d-link.com
# Version : DSL-2740B
# Tested on : Firmware Version: EU_1.0 (other models/firmware could be also affected)
# Original Advisory : http://www.webapp-security.com/2013/03/d-link-dsl-2740b-adsl-router-authentication-bypass/
# CVE : CVE-2013-2271
+-------------------------------------------------------------------------------------------------------------------------------------------+
+---------------------------------------[D-Link DSL-2740B Bypass Authentication by Ivano Binetti]-------------------------------------------+
Summary

1)Introduction
2)Vulnerability Description
3)Exploit
+--------------------------------------------------------------------------------------------------------------------------------------------+

1)Introduction
D-Link DSL-2740B is an ADSL Router using a web management interface in order to change configuration settings.

2)Vulnerability Description
This router allows an attacker to bypass authentication and to login with administrator ("admin" user) permissions.
When the administrator is logged in the web management interface, an attacker is be able to completely bypass authentication phase and
connect to the web management interface with administrator's credentials.
Please observe that the default URL to access to the web management interface is "http://192.168.1.1" but this attack can also be
performed by an axternal attacker who connects to the router's public IP address, if remote management is enabled.

3)Exploit
When an administrator in logged in the web management interface an attacker can bypass authentication and get administrator permissions
connecting to the following URL:

http://<ip address>/login.cgi (where <ip address> can be both internal or public)

Trust: 1.0

sources: EXPLOIT-DB: 24563

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 24563

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 24563

TYPE

Authentication Bypass

Trust: 1.0

sources: EXPLOIT-DB: 24563

TAGS

tag:exploit

Trust: 0.5

tag:bypass

Trust: 0.5

sources: PACKETSTORM: 120613

CREDITS

Ivano Binetti

Trust: 0.6

sources: EXPLOIT-DB: 24563

EXTERNAL IDS

db:NVDid:CVE-2013-2271

Trust: 2.7

db:EXPLOIT-DBid:24563

Trust: 1.6

db:EDBNETid:46653

Trust: 0.6

db:0DAYTODAYid:20469

Trust: 0.6

db:EDBNETid:20349

Trust: 0.6

db:PACKETSTORMid:120613

Trust: 0.5

sources: PACKETSTORM: 120613 // EXPLOIT-DB: 24563 // EDBNET: 46653 // EDBNET: 20349

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-2271

Trust: 2.7

url:http://www.webapp-security.com/2013/03/d-link-dsl-2740b-adsl-router-authentication-bypass/

Trust: 1.0

url:https://www.exploit-db.com/exploits/24563/

Trust: 0.6

url:https://0day.today/exploits/20469

Trust: 0.6

sources: PACKETSTORM: 120613 // EXPLOIT-DB: 24563 // EDBNET: 46653 // EDBNET: 20349

SOURCES

db:PACKETSTORMid:120613
db:EXPLOIT-DBid:24563
db:EDBNETid:46653
db:EDBNETid:20349

LAST UPDATE DATE

2022-07-27T09:27:34.624000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:120613date:2013-03-02T03:15:42
db:EXPLOIT-DBid:24563date:2013-03-04T00:00:00
db:EDBNETid:46653date:2013-03-04T00:00:00
db:EDBNETid:20349date:2013-03-02T00:00:00