Summary
This host is running D-Link DIR-100 Router and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to cause denial of service or execute arbitrary HTML and script code in a user's browser session in context of an affected website.
Impact Level: Application
Solution
Apply the patch or upgrade to version 4.03B13 or later, For updates refer to http://more.dlink.de/sicherheit/index.html For Patch refer to http://exploitsdownload.com/exploit/na/d-link-dir-100-csrf-xss-disclosure-authentication
Insight
Multiple flaws are due to,
- Retrieve the Administrator password and sensitive configuration parameters like the pppoe username and password without authentication.
- Execute privileged Commands without authentication through a race condition leading to weak authentication enforcement.
- Sending formatted request to a victim which then will execute arbitrary commands on the device.
- Store arbitrary javascript code which will be executed when a victim accesses the administrator interface.
Affected
D-Link DIR-100 Hardware Revision: D1 Software Version: 4.03B07
Detection
Send a crafted data via HTTP request and check whether it is able to read the user information.
References
Severity
Classification
-
CVE CVE-2013-7051, CVE-2013-7052, CVE-2013-7053, CVE-2013-7054, CVE-2013-7055 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Advantech Studio 'NTWebServer.exe' Directory Traversal Vulnerability
- ArticleFR CMS 'id' Parameter SQL Injection Vulnerability
- AlstraSoft AskMe Pro 'forum_answer.php' and 'profile.php' Multiple SQL Injection Vulnerabilities
- AWCM CMS Multiple Remote File Include Vulnerabilities
- ALCASAR Remote Code Execution Vulnerability