D-Link DIR-615 Remote Exploit
2009-12-20 19:50
357 查看
D-Link’s DIR-615 Wireless N Router (http://www.dlink.com/products/?pid=565) contains a flaw that allows attackers to access administrative functions without authorization. By simply requesting a certain URL, this vulnerability can be used to perform numerous attacks including changing the admin password, disabling wireless security, and changing DNS settings.
The hole is confirmed in firmware version 3.10NA.
Example (changes admin password to ‘pwdpwd’):
Change password on 192.168.0.1
The hole is confirmed in firmware version 3.10NA.
Example (changes admin password to ‘pwdpwd’):
Change password on 192.168.0.1
相关文章推荐
- D-Link 615 C2 路由器固件烧写与配置
- D-Link dir-618、619双路由 wds扩展无线网络覆盖范围
- 电信送的无线路由猫再串连一个D-link dir 600nb无线路由设置
- D-Link的DIR-655无线网络firmware升级(一)
- 两台dlink dir-600M 无线路由+WDS桥接成功方法
- Dlink DIR-615L 和水星(mercury) MW300R桥接方法!
- Dir-615刷dd-wrt 及wifi eap 认证
- DI、DIR系列D-Link路由器联机方式详解
- 揭秘家用路由器0day漏洞挖掘技术读书笔记 D-Link DIR-645 authentication.cgi溢出漏洞分析
- iphone接入 D-Link路由器【型号:DIR-612】 时网路崩溃 解决方案
- 揭秘家用路由器0day漏洞挖掘技术读书笔记 D-Link DIR-505 my_cgi.cgi溢出漏洞分析
- D-Link的DIR-655无线网络firmware升级(二) 结束篇
- JFFS2 error: (1) jffs2_build_inode_pass1: child dir "udhcpc" (ino #440) of dir ino #336 appears to be a hard link
- D-LINK 无线路由器调试图解(DIR-600M)
- Dlink DIR-615L 和 Mercury MW300R WDS 应用举例
- 揭秘家用路由器0day漏洞挖掘技术读书笔记 D-Link DIR-815 hedwig.cgi溢出漏洞分析
- 关于VS 2010 LINK : fatal error LNK1123: 转换到 COFF 期间失败: 文件无效或损坏解决方案
- TI C2000 compiler download link
- 报错:Link of class 'Lcom/.../PersistentConnectionListener;' failed ...VFY: unable to resolve new-insta
- 报错:LINK : fatal error LNK1123: 转换到 COFF 期间失败: 文件无效或损坏