Full Disclosure mailing list archives
[CVE-2018-18009] dirary0.js on D-Link DIR-140L, DIR-640L devices allows remote unauthenticated attackers to discover admin credentials
From: Tyler Cui <tyler.cui () live com>
Date: Sun, 16 Dec 2018 13:11:52 +0000
[Vendor] us.dlink.com [Product] DIR-140L (version 1.02) DIR-640L (version 1.01RU) Other versions might also be affected. [Vulnerability Type] admin credentials disclosure [Affected Component] Web Interface [CVE Reference] CVE-2018-18009 [Security Issue] An authenticated user can visit the file dirary0.js, for example, http://victime_ip/dirary0.js, and obtain clear text password of user admin at the line: gosave_ok = ("__password__".length < 6)?true:false [Network Access] Remote via Web Interface [Authentication] Not required [Disclosure Timeline] 2018-06-17: Vendor Notification 2018-06-19: Vendor acknowledgement 2018-10-23: Request update 2018-10-26: Vendor: "I don't have an update currently, but fixes are under development." 2018-12-07: Inform vendor of disclosure 2018-12-17: Public Disclosure _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- [CVE-2018-18009] dirary0.js on D-Link DIR-140L, DIR-640L devices allows remote unauthenticated attackers to discover admin credentials Tyler Cui (Dec 21)