Skip to content

D-Link DNS Series CGI Script - Unauthenticated

ID: dlink-unauth-cgi-script

Severity: low

Author: pussycat0x

Tags: unauth,dlink,misconfig

A vulnerability has been identified in the D-Link DNS series network storage devices, allowing for the exposure of sensitive device information to unauthorized actors. This vulnerability is due to an unauthenticated access flaw in the info.cgi script, which can be exploited via a simple HTTP GET request, affecting over 920,000 devices on the Internet.

id: dlink-unauth-cgi-script
info:
name: D-Link DNS Series CGI Script - Unauthenticated
author: pussycat0x
severity: low
description: |
A vulnerability has been identified in the D-Link DNS series network storage devices, allowing for the exposure of sensitive device information to unauthorized actors. This vulnerability is due to an unauthenticated access flaw in the info.cgi script, which can be exploited via a simple HTTP GET request, affecting over 920,000 devices on the Internet.
reference:
- https://github.com/netsecfish/info_cgi
classification:
cpe: cpe:2.3:h:dlink:dns-345:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: dlink
product: dns-345
fofa-query: "app=\"D_Link-DNS\""
tags: unauth,dlink,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/info.cgi"
matchers-condition: and
matchers:
- type: word
words:
- "Product="
- "Version="
- "Model="
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100a4956c2eca44123dd94c94efb1c4e74802f00ab5fa9873b23207d14920003f9502207e44f12ab097d6b1d0cb95c6a8e11fe9b6fd3f7667abfce208b967ad19b4ab9e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/dlink-unauth-cgi-script.yaml"

View on Github