#################################################################################### # Exploit Title: Dlink DIR-600L Hardware Version AX Firmware Version 1.00 CSRF Vulnerability # Google Dork: N/A # Date: 20/03/2014 # Exploit Author: Dhruv Shah # Vendor Homepage: http://www.dlink.com/us/en/home-solutions/connect/routers/dir-600l-wireless-n-150-home-cloud-router # Software Link: N/A # Hardware Version:E4 # Firmware Version:5.10 # Tested on: Router Web Server # CVE : N/A ################################################################################### Cross Site Request Forgery This Modem's Web Application , suffers from Cross-site request forgery through which attacker can manipulate user data via sending him malicious craft url. The Modems's Application not using any security token to prevent it against CSRF. You can manipulate any userdata. PoC and Exploit to change user password: In the POC the IP address in the POST is the modems IP address.
______________________ *Dhruv Shah* *aka Snypter* Blogger | Researcher | Consultant | Writer Youtube | Facebook| Linkedin | Twitter| Blog