D-Link DNS Series CGI Script - Unauthenticated
ID: dlink-unauth-cgi-script
Severity: low
Author: pussycat0x
Tags: unauth,dlink,misconfig
Description
Section titled “Description”A vulnerability has been identified in the D-Link DNS series network storage devices, allowing for the exposure of sensitive device information to unauthorized actors. This vulnerability is due to an unauthenticated access flaw in the info.cgi script, which can be exploited via a simple HTTP GET request, affecting over 920,000 devices on the Internet.
YAML Source
Section titled “YAML Source”id: dlink-unauth-cgi-script
info: name: D-Link DNS Series CGI Script - Unauthenticated author: pussycat0x severity: low description: | A vulnerability has been identified in the D-Link DNS series network storage devices, allowing for the exposure of sensitive device information to unauthorized actors. This vulnerability is due to an unauthenticated access flaw in the info.cgi script, which can be exploited via a simple HTTP GET request, affecting over 920,000 devices on the Internet. reference: - https://github.com/netsecfish/info_cgi classification: cpe: cpe:2.3:h:dlink:dns-345:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: dlink product: dns-345 fofa-query: "app=\"D_Link-DNS\"" tags: unauth,dlink,misconfig
http: - method: GET path: - "{{BaseURL}}/cgi-bin/info.cgi"
matchers-condition: and matchers: - type: word words: - "Product=" - "Version=" - "Model=" condition: and
- type: status status: - 200# digest: 4a0a00473045022100a4956c2eca44123dd94c94efb1c4e74802f00ab5fa9873b23207d14920003f9502207e44f12ab097d6b1d0cb95c6a8e11fe9b6fd3f7667abfce208b967ad19b4ab9e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/misconfiguration/dlink-unauth-cgi-script.yaml"