ID

VAR-E-201704-0086


CVE

cve_id:CVE-2018-10824

Trust: 2.1

cve_id:CVE-2017-6190

Trust: 1.3

cve_id:CVE-2018-10822

Trust: 0.5

cve_id:CVE-2018-10823

Trust: 0.5

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45677 // EDBNET: 99966

EDB ID

45677


TITLE

D-Link Routers - Plaintext Password - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 45677

DESCRIPTION

D-Link Routers - Plaintext Password. CVE-2018-10824 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 45677

AFFECTED PRODUCTS

vendor:d linkmodel:routersscope: - version: -

Trust: 1.6

vendor:d linkmodel:dwr-116scope: - version: -

Trust: 0.5

vendor:d linkmodel:plain-text password storagescope: - version: -

Trust: 0.5

vendor:d linkmodel:dwr-116 1.05scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.01scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.00 b10scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.05b09scope:neversion: -

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45677 // EDBNET: 99966

EXPLOIT

## Password stored in plaintext
CVE: CVE-2018-10824

Description:

An issue was discovered on D-Link routers:

DWR-116 through 1.06,
DIR-140L through 1.02,
DIR-640L through 1.02,
DWR-512 through 2.02,
DWR-712 through 2.02,
DWR-912 through 2.02,
DWR-921 through 2.02,
DWR-111 through 1.01,
and probably others with the same type of firmware.
NOTE: I have changed the filename in description to XXX because the vendor leaves some EOL routers unpatched and the attack is too simple

The administrative password is stored in plaintext in the /tmp/XXX/0 file. An attacker having a directory traversal (or LFI) can easily get full router access.

PoC using the directory traversal vulnerability disclosed above - CVE-2018-10822

`$ curl http://routerip/uir//tmp/XXX/0`
This command returns a binary config file which contains admin username and password as well as many other router configuration settings. By using the directory traversal vulnerability it is possible to read the file without authentication.

Trust: 1.0

sources: EXPLOIT-DB: 45677

EXPLOIT LANGUAGE

md

Trust: 0.6

sources: EXPLOIT-DB: 45677

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 45677

TYPE

Plaintext Password

Trust: 1.6

sources: EXPLOIT-DB: 45677 // EDBNET: 99966

TAGS

tag:exploit

Trust: 1.0

tag:file inclusion

Trust: 1.0

tag:arbitrary

Trust: 0.5

tag:vulnerability

Trust: 0.5

tag:code execution

Trust: 0.5

sources: PACKETSTORM: 142052 // PACKETSTORM: 149844

CREDITS

Blazej Adamczyk

Trust: 0.6

sources: EXPLOIT-DB: 45677

EXTERNAL IDS

db:NVDid:CVE-2018-10824

Trust: 2.1

db:EXPLOIT-DBid:45677

Trust: 1.6

db:NVDid:CVE-2017-6190

Trust: 1.3

db:EDBNETid:99966

Trust: 0.6

db:PACKETSTORMid:142052

Trust: 0.5

db:NVDid:CVE-2018-10822

Trust: 0.5

db:NVDid:CVE-2018-10823

Trust: 0.5

db:PACKETSTORMid:149844

Trust: 0.5

db:BIDid:97620

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45677 // EDBNET: 99966

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-10824

Trust: 2.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6190

Trust: 1.0

url:http://sploit.tech/2018/10/12/d-link.html

Trust: 1.0

url:https://www.exploit-db.com/exploits/45677/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-10822

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-10823

Trust: 0.5

url:http://seclists.org/bugtraq/2017/apr/28

Trust: 0.3

url:http://www.d-link.com

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45677 // EDBNET: 99966

SOURCES

db:BIDid:97620
db:PACKETSTORMid:142052
db:PACKETSTORMid:149844
db:EXPLOIT-DBid:45677
db:EDBNETid:99966

LAST UPDATE DATE

2022-07-27T09:11:31.195000+00:00


SOURCES UPDATE DATE

db:BIDid:97620date:2017-04-18T00:06:00

SOURCES RELEASE DATE

db:BIDid:97620date:2017-04-07T00:00:00
db:PACKETSTORMid:142052date:2017-04-07T19:22:22
db:PACKETSTORMid:149844date:2018-10-18T03:47:09
db:EXPLOIT-DBid:45677date:2018-10-12T00:00:00
db:EDBNETid:99966date:2018-11-04T00:00:00