what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

D-Link DIR-601 Failed Password Change Control

D-Link DIR-601 Failed Password Change Control
Posted May 4, 2018
Authored by Joe Gray

D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext.

tags | advisory
advisories | CVE-2018-10641
SHA-256 | c2f677dc653a79692726bbccff8050f283ad34e84c33c202f140624c41984b88

D-Link DIR-601 Failed Password Change Control

Change Mirror Download
 [Suggested description]
D-Link DIR-601 A1 1.02NA devices do not require the old password for a
password change, which occurs in cleartext.

------------------------------------------

[Additional Information]
Insecure Authentication Practices in D-LINK DIR-601 Router, Hardware
version A1, Firmware Version 1.02NA

When logging into the router, the authentication module passes the
username and password BASE64 encoded vice encrypted. When changing the
password a) no current password is required; and b) it passes the new
password and username in plain text. There is also no support for
HTTPS connections to the router.

Due to no schedule viability D-Link asks that two items are mentioned in
disclosure:

a) For this out of service router, users are encouraged too used DD-WRT
firmware here <http://www.dd-wrt.com/site/support/router-database>
b) They can contact support@dlink.com for the latest information on
updates.

------------------------------------------

[VulnerabilityType Other]
Weak Authentication and No HTTPS support

------------------------------------------

[Vendor of Product]
D-Link

------------------------------------------

[Affected Product Code Base]
DIR 601 - Hardware A1, Firmware 1.02NA

------------------------------------------

[Affected Component]
Login, Password Changing

------------------------------------------

[Attack Type]
Context-dependent

------------------------------------------

[Impact Information Disclosure]
true

------------------------------------------

[Attack Vectors]
To exploit this, an attacker must have a proxy or man-in-the-middle attack
completed and be able to discern the URLs to intercept passed parameters.

------------------------------------------

[Has vendor confirmed or acknowledged the vulnerability?]
true

------------------------------------------

[Remediation]
Due to no schedule viability D-Link asks that two items are mentioned in
disclosure:

a) For this out of service router, users are encouraged too used DD-WRT
firmware here
b) They can contact support@dlink.com for the latest information on
updates.

------------------------------------------
[References]
http://us.dlink.com/security-advisories/
<http://us.dlink.com/security-advisories/>
https://advancedpersistentsecurity.net/cve-2018-10641/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10641



Joe Gray


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close