Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-6206 PoC — 多款D-Link DGS-1510 Websmart设备信息泄露漏洞

Source
Associated Vulnerability
Title:多款D-Link DGS-1510 Websmart设备信息泄露漏洞 (CVE-2017-6206)
Description:D-Link DGS-1510-28XMP等都是友讯(D-Link)公司的以太网交换机。 使用1.31.B003之前版本固件的多款D-Link DGS-1510 Websmart设备中存在信息泄露漏洞。攻击者可利用该漏洞获取敏感信息。以下设备受到影响:D-Link DGS-1510-28XMP,DGS-1510-28X,DGS-1510-52X,DGS-1510-52,DGS-1510-28P,DGS-1510-28,DGS-1510-20。
Description
The DGS-1510 Websmart switch series firmware has been found to have security vulneratiblies. The vulnerabilities include unauthenticated command bypass and unauthenticated information disclosure.
Readme
# CVE-2017-6206

The DGS-1510 Websmart switch series firmware has been found to have security vulneratiblies. The vulnerabilities include unauthenticated command bypass and unauthenticated information disclosure.

exploit.sh contains both PoC code and it will create a remote user at specified D-Link Enterprise Switch Without Authentication 

vamin$ sh exploit.sh "1.1.1.1"


 ####################################################################
 # exploit.sh 				                            #
 # D-link DGS Authentication Bypass  0-day 	                    #
 # By  : Varang Amin & Aditya Sood                                  #
 #####################################################################

Steps


      1. Collect The User Info From DGS Vulnerable Switch
      2. Add a user name dlinktest into DGS swith
      3. Collect The User Info & verify the new dlinktest  user added with Admin Access

File Snapshot

[4.0K] /data/pocs/f57e59042d210a76ba8946f264cc4b26ffad5814 ├── [1.2K] exploit.sh ├── [2.4K] get-user-info.py ├── [ 908] README.md └── [2.6K] user_add.py 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.