19 lines
No EOL
1.1 KiB
Text
19 lines
No EOL
1.1 KiB
Text
Multiple D-Link routers suffer from insecure implementations of the Home Network Administration
|
||
Protocol which allow unauthenticated and/or unprivileged users to view and configure administrative
|
||
settings on the router.
|
||
|
||
Further, the mere existence of HNAP allows attackers to completely bypass the CAPTCHA login
|
||
features that D-Link has made available in recent firmware releases.
|
||
|
||
It is suspected that most, if not all, D-Link routers manufactured since 2006 have HNAP support and
|
||
are vulnerable to one of the below described vulnerabilities. However, only the following routers and
|
||
firmware versions have been confirmed to date:
|
||
|
||
1) DI524 hardware version C1, firmware version 3.23
|
||
2) DIR628 hardware version B2, firmware versions 1.20NA and 1.22NA
|
||
3) DIR655 hardware version A1, firmware version 1.30EA
|
||
|
||
Detailed description available here:
|
||
http://www.sourcesec.com/Lab/dlink_hnap_captcha.pdf
|
||
|
||
POC code available here: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11101.tar.gz (hnap0wn.tar.gz) |