CVE-2017-7405
https://notcve.org/view.php?id=CVE-2017-7405
On the D-Link DIR-615 before v20.12PTb04, once authenticated, this device identifies the user based on the IP address of his machine. By spoofing the IP address belonging to the victim's host, an attacker might be able to take over the administrative session without being prompted for authentication credentials. An attacker can get the victim's and router's IP addresses by simply sniffing the network traffic. Moreover, if the victim has web access enabled on his router and is accessing the web interface from a different network that is behind the NAT/Proxy, an attacker can sniff the network traffic to know the public IP address of the victim's router and take over his session as he won't be prompted for credentials. En D-Link DIR-615 en versiones anteriores a la v20.12PTb04, una vez autenticado, el dispositivo identifica al usuario basándose en la dirección IP de su máquina. • ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf • CWE-287: Improper Authentication •
CVE-2017-7406
https://notcve.org/view.php?id=CVE-2017-7406
The D-Link DIR-615 device before v20.12PTb04 doesn't use SSL for any of the authenticated pages. Also, it doesn't allow the user to generate his own SSL Certificate. An attacker can simply monitor network traffic to steal a user's credentials and/or credentials of users being added while sniffing the traffic. El dispositivo D-Link DIR-615 en versiones anteriores a v20.12PTb04 no emplea SSL en ninguna de las páginas autenticadas. Además, tampoco permite que el usuario genere su propio certificado SSL. • ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf • CWE-295: Improper Certificate Validation CWE-311: Missing Encryption of Sensitive Data •
CVE-2017-7404
https://notcve.org/view.php?id=CVE-2017-7404
On the D-Link DIR-615 before v20.12PTb04, if a victim logged in to the Router's Web Interface visits a malicious site from another Browser tab, the malicious site then can send requests to the victim's Router without knowing the credentials (CSRF). An attacker can host a page that sends a POST request to Form2File.htm that tries to upload Firmware to victim's Router. This causes the router to reboot/crash resulting in Denial of Service. An attacker may succeed in uploading malicious Firmware. En D-Link DIR-615 en versiones anteriores a v20.12PTb04, si una víctima con sesión iniciada en la interfaz web del router visita un sitio malicioso desde otra pestaña Browser, el sitio malicioso podría enviar peticiones al router de la víctima sin conocer las credenciales (CSRF). • ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2017-9542
https://notcve.org/view.php?id=CVE-2017-9542
D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device. El Enrutador DIR-615 Wireless N 300 de D-Link, permite la omisión de autenticación por medio de una petición POST modificada para el archivo login.cgi. Este problema ocurre porque no puede comprobar el campo password. • http://www.securityfocus.com/bid/98992 https://twitter.com/tiger_tigerboy/status/873458088321220609 https://www.facebook.com/tigerBOY777/videos/1368513696568992 • CWE-287: Improper Authentication •
CVE-2017-7398 – D-Link DIR-615 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2017-7398
D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated, as demonstrated by changing the Security option from WPA2 to None, or changing the hiddenSSID parameter, SSID parameter, or a security-option password. D-Link DIR-615 HW: T1 FW:20.09 es vulnerable a la vulnerabilidad Cross-Site Request Forgery (CSRF). Esto permite a un atacante realizar una acción no deseada en un enrutador inalámbrico para el cual el usuario / administrador está actualmente autenticado, como se demuestra cambiando la opción de seguridad de WPA2 a Ninguno o cambiando el parámetro hiddenSSID, el parámetro SSID o una contraseña de opción de seguridad. D-Link DIR-615 suffers from a cross site request forgery vulnerability. • https://www.exploit-db.com/exploits/41821 http://seclists.org/fulldisclosure/2017/Apr/4 • CWE-352: Cross-Site Request Forgery (CSRF) •