Advertisement






D-Link DIR-890L A2 Improper Access Control

CVE Category Price Severity
CVE-2018-19106 CWE-284 Not specified High
Author Risk Exploitation Type Date
Kaspersky Lab High Remote 2018-07-03
CPE
cpe:cpe:/h:d-link:dir-890l_firmware:a2
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018070027

Below is a copy:

D-Link DIR-890L A2 Improper Access Control
[Suggested description]
An issue was discovered on D-Link DIR-890L A2 devices.
Due to the predictability of the /docs/captcha_(number).jpeg URI,
being local to the network, but unauthenticated to the administrator's
panel, an attacker can disclose the CAPTCHAs used by the access point
and can elect to load the CAPTCHA of their choosing, leading to
unauthorized login attempts to the access point.

------------------------------------------

[Vulnerability Type]
Incorrect Access Control

------------------------------------------

[Vendor of Product]
D-Link

------------------------------------------

[Affected Product Code Base]
DIR-890L - A2

------------------------------------------

[Affected Component]
Due to the predictability in the /docs/captcha_(number).jpeg while
loading the CAPTCHA, an attacker can change the CAPTCHA to load and
can load the same CAPTCHA each time.

------------------------------------------

[Attack Type]
Local

------------------------------------------

[Impact Information Disclosure]
true

------------------------------------------

[CVE Impact Other]
Predictability of CAPTCHA resulting in unauthorized login attempts to the
access point

------------------------------------------

[Attack Vectors]
An attacker must be local to the network but unauthenticated to the
administrator's panel.

------------------------------------------

[Has vendor confirmed or acknowledged the vulnerability?]
true

------------------------------------------

[Discoverer]
Kevin Randall

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum