Administrator Credential Exposure in D-Link Routers
CVE-2017-3192

9.8CRITICAL

Key Information:

Vendor
D-link
Vendor
CVE Published:
16 December 2017

Summary

D-Link DIR-130 and DIR-330 routers have a security flaw in their firmware that allows for the exposure of administrator credentials due to insufficient protection. The tools_admin.asp page returns the administrator password in base64 encoding, which can be easily decoded by a remote attacker who gains access to the page. This vulnerability can potentially be exploited in conjunction with an authentication bypass, enabling unauthorized disclosure of sensitive information and administrative access to the device.

Affected Version(s)

DIR-130 1.23

DIR-330 1.12

References

EPSS Score

53% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.