ID
VAR-201011-0296
TITLE
D-Link DIR-300 'tools_admin.php' Secure Bypass Vulnerability
Trust: 0.6
DESCRIPTION
The D-Link DIR-300 is a wireless router device. When an attacker accesses the D-Link DIR-300, he or she can exploit the vulnerability bypass authentication for management configuration. The control panel script tools_admin.php allows an attacker to change the administrator's name, password, and other variables. An unauthorized attacker can send a specially crafted HTTP POST request to change these parameters: POST http://192.168.1.1:80/tools_admin.php HTTP/ 1.1Host: 192.168.1.2Keep-Alive: 115Content-Type: application/x-www-form-urlencodedContent-length: 0ACTION_POST=LOGIN&LOGIN_USER=a&LOGIN_PASSWD=b&login=+Log+In+&NO_NEED_AUTH=1&AUTH_GROUP=0&admin_name=admin&admin_password1=uhOHahEh. Remote attackers can exploit these issues to bypass security restrictions, access certain administrative functions, alter configuration, and compromise the affected device. D-Link DIR-300 running firmware 2.01B1, 1.04, 1.05 are vulnerable. Additional models and firmware versions may also be affected
Trust: 0.81
IOT TAXONOMY
category: | ['IoT', 'Network device'] | sub_category: | - | Trust: 0.6 |
AFFECTED PRODUCTS
vendor: | d link | model: | dir-300 | scope: | eq | version: | 1.04 | Trust: 0.9 |
vendor: | d link | model: | dir-300 | scope: | eq | version: | 1.05 | Trust: 0.9 |
vendor: | d link | model: | dir-300 2.01b1 | scope: | - | version: | - | Trust: 0.9 |
vendor: | d link | model: | dir-300 | scope: | - | version: | - | Trust: 0.6 |
vendor: | d link | model: | dir-615 4.13b01 | scope: | - | version: | - | Trust: 0.3 |
vendor: | d link | model: | dir-320 | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | d link | model: | dir-300 2.05b03 | scope: | - | version: | - | Trust: 0.3 |
vendor: | d link | model: | dir-300 | scope: | eq | version: | 2.04 | Trust: 0.3 |
vendor: | d link | model: | dir-300 1.05b09 | scope: | - | version: | - | Trust: 0.3 |
vendor: | d link | model: | dir-300 | scope: | eq | version: | 0 | Trust: 0.3 |
THREAT TYPE
network
Trust: 0.3
TYPE
Design Error
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 44743 | Trust: 0.9 |
db: | CNVD | id: | CNVD-2010-2744 | Trust: 0.6 |
REFERENCES
url: | http://www.securityfocus.com/archive/1/514687 | Trust: 0.6 |
url: | http://www.dlink.com/ | Trust: 0.3 |
url: | /archive/1/514687 | Trust: 0.3 |
url: | /archive/1/514742 | Trust: 0.3 |
url: | /archive/1/514755 | Trust: 0.3 |
url: | /archive/1/514968 | Trust: 0.3 |
CREDITS
Karol Celia~Dsk and Craig Heffner
Trust: 0.3
SOURCES
db: | CNVD | id: | CNVD-2010-2744 |
db: | BID | id: | 44743 |
LAST UPDATE DATE
2022-05-17T02:07:21.903000+00:00
SOURCES UPDATE DATE
db: | CNVD | id: | CNVD-2010-2744 | date: | 2010-11-11T00:00:00 |
db: | BID | id: | 44743 | date: | 2010-12-03T10:55:00 |
SOURCES RELEASE DATE
db: | CNVD | id: | CNVD-2010-2744 | date: | 2010-11-11T00:00:00 |
db: | BID | id: | 44743 | date: | 2010-11-09T00:00:00 |