Description
D-Link DIR601 2.02NA contains a credential disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive configuration data by manipulating the table_name parameter in POST requests. Attackers can send requests to /my_cgi.cgi with table_name values like admin_user, wireless_settings, and wireless_security to extract administrative credentials and wireless network keys in clear text.
Problem types
Exposure of Sensitive System Information to an Unauthorized Control Sphere
Product status
Credits
Richard Rogerson
References
www.exploit-db.com/exploits/45002 (ExploitDB-45002)
ca.dlink.com/ (Official Product Homepage)
www.packetlabs.net (Official Product Homepage)
support.dlink.ca/ProductInfo.aspx?m=DIR-601 (Product Reference)
www.vulncheck.com/...na-credential-disclosure-via-my-cgi-cgi (VulnCheck Advisory: D-Link DIR601 2.02NA Credential Disclosure via my_cgi.cgi)