D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 are vulnerable to authentication bypass of the remote login page. A remote attacker that can access the remote management login page can manipulate the POST request in such a manner as to access some administrator-only pages such as tools_admin.asp without credentials.
References
Link | Resource |
---|---|
https://www.wilderssecurity.com/threads/d-link-dir-130-and-dir-330-are-vulnerable-to-authentication-bypass-and-do-not-protect-credentials.392703/ | Issue Tracking Third Party Advisory |
https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ | Press/Media Coverage |
https://www.kb.cert.org/vuls/id/553503 | Issue Tracking Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/123293 | VDB Entry |
Information
Published : 2017-12-15 18:29
Updated : 2019-10-09 16:27
NVD link : CVE-2017-3191
Mitre link : CVE-2017-3191
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
d-link
- dir-130
- dir-330_firmware
- dir-330
- dir-130_firmware