Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12578
HistoryMay 07, 2006 - 12:00 a.m.

[NEWS] D-Link DSL-G604T Wireless Router Directory Traversal

2006-05-0700:00:00
vulners.com
30

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam
web site: http://www.securiteam.com

    • promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


D-Link DSL-G604T Wireless Router Directory Traversal

SUMMARY

"DSL-G604T, a Wireless ADSL router modem combining both an ADSL modem and
802.11g wireless router in one unit, bringing high-speed wireless Internet
connection to a home or office."

Improper parameter validation causes a directory traversal situation with
D-Link DSL-G604T Wireless Routers.

DETAILS

Vulnerable Systems:

  • D-Link firmware version V1.00B02T02.EU.20040618

D-Link DSL-G604T Wireless Router does not properly validate and check the
user input.
Attackers can cause a directory traversal by using the parameter getpage
that is used with /cgi-bin/webcm .

Proof of Concept:
http://192.168.1.1/cgi-bin/webcm?getpage=/etc/passwd

ADDITIONAL INFORMATION

The information has been provided by <mailto:[email protected]> Qex.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to:
[email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]

====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages.