There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.
References
Link | Resource |
---|---|
https://github.com/dahua966/Routers-vuls/blob/master/DIR-868/name%26passwd.py | Exploit Third Party Advisory |
Information
Published : 2019-10-11 13:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-17506
Mitre link : CVE-2019-17506
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
dlink
- dir-817lw_a1
- dir-868l_b1_firmware
- dir-868l_b1
- dir-817lw_a1_firmware