### [CVE-2013-6026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6026) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The web interface on D-Link DIR-100, DIR-120, DI-624S, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 routers; Planex BRL-04R, BRL-04UR, and BRL-04CW routers; and Alpha Networks routers allows remote attackers to bypass authentication and modify settings via an xmlset_roodkcableoj28840ybtide User-Agent HTTP header, as exploited in the wild in October 2013. ### POC #### Reference - http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ - http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/ #### Github - https://github.com/Soldie/bamf-SHODAN.IO - https://github.com/malwaredllc/bamf