D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 do not sufficiently protect administrator credentials. The tools_admin.asp page discloses the administrator password in base64 encoding in the returned web page. A remote attacker with access to this page (potentially through a authentication bypass such as CVE-2017-3191) may obtain administrator credentials for the device.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/123292 | Issue Tracking Third Party Advisory VDB Entry |
https://www.kb.cert.org/vuls/id/553503 | Issue Tracking Third Party Advisory US Government Resource |
https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ | Third Party Advisory |
https://www.wilderssecurity.com/threads/d-link-dir-130-and-dir-330-are-vulnerable-to-authentication-bypass-and-do-not-protect-credentials.392703/ | Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2017-12-15T14:00:00
Updated: 2017-12-15T13:57:01
Reserved: 2016-12-05T00:00:00
Link: CVE-2017-3192
JSON object: View
NVD Information
Status : Modified
Published: 2017-12-16T02:29:10.323
Modified: 2023-04-26T18:55:30.893
Link: CVE-2017-3192
JSON object: View
Redhat Information
No data.
CWE