### [CVE-2017-3191](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3191) ![](https://img.shields.io/static/v1?label=Product&message=DIR-130&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-330&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay&color=brighgreen) ### Description D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 are vulnerable to authentication bypass of the remote login page. A remote attacker that can access the remote management login page can manipulate the POST request in such a manner as to access some administrator-only pages such as tools_admin.asp without credentials. ### POC #### Reference - https://www.kb.cert.org/vuls/id/553503 - https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ #### Github No PoCs found on GitHub currently.