Short Name |
HTTP:MISC:DLINK-DIR-300 |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
D-Link DIR-300 tools_admin.php Cross-Site Request Forgery |
Release Date |
2012/12/07 |
Update Number |
2209 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in D-Link DIR-300. An attacker may craft a url that when followed by a user can modify arbitrary records in the database, including user accounts and administrator privileges. A remote attacker can exploit this vulnerability by enticing a user to follow crafted URI, upon successful exploitation the attacker can login to the administrator console with the created account and execute commands with the privileges of the affected service.
The D-Link DIR-300 router is prone to a cross-site request-forgery vulnerability. Successful exploits may allow attackers to run privileged commands on the affected device, change configuration, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible. This issue affects D-Link DIR-300 running firmware 1.04.