Um grupo de investigadores da Universidade Tecnológica, na Polônia, descobriu três vulnerabilidades em alguns modelos de routers D-Link que podem ser encadeados para assumir o controlo total sobre os dispositivos.
As falhas são Directory Traversal (CVE-2018-10822), Password stored in plaintext (CVE-2018-10824), e uma Shell command injection (CVE-2018-10823).
“I have found multiple vulnerabilities in D-Link router httpd server. These vulnerabilities are present in multiple D-Link types of routers. All three taken together allow to take a full control over the router including code execution.” reads the security advisory.
As vulnerabilidades residem no servidor httpd de alguns routers D-Link, incluindo os modelos DWR-116, DWR-111, DIR-140, DIR-640, DWR-512, DWR-712, DWR-912 e DWR-921.
Os investigadores descobriram uma vulnerabilidade directory traversal , identificada como CVE-2018-10822, que poderia ser explorada por atacantes remotos para ler arquivos arbitrários utilizado um pedido HTTP.
O problema foi inicialmente reportada à D-Link como CVE-2017-6190, mas o fornecedor não corrigiu corretamente a falha.
Pedro Tavares is a professional in the field of information security working as an Ethical Hacker/Pentester, Malware Researcher and also a Security Evangelist. He is also a founding member at CSIRT.UBI and Editor-in-Chief of the security computer blog seguranca-informatica.pt.
In recent years he has invested in the field of information security, exploring and analyzing a wide range of topics, such as pentesting (Kali Linux), malware, exploitation, hacking, IoT and security in Active Directory networks. He is also Freelance Writer (Infosec. Resources Institute and Cyber Defense Magazine) and developer of the 0xSI_f33d – a feed that compiles phishing and malware campaigns targeting Portuguese citizens.
Read more here.