D-Link Security Bug Let Hackers Allow to Compromise a Severe Network

by chebbi abir

Recently, the security experts have detected multiple security flaws in the D-Link routers that could allow a severe network compromise. The security researchers of Loginsoft have detected three major flaws; rather than these three flaws, experts have also detected another two security flaws that are affecting all similar products. 

The routers that are affected are quite affordable, but at the same time, it’s essential to wireless networking exposition. As they connect the most advanced high-speed 802.11ac Wi-Fi technology with dual-band technology and fast Ethernet ports to provide a smooth networking experience.

It is quite easy to get access to the three flaws by obtaining the products’ public IPs. But here, the most interesting part is to exploit the other two flaws that are DIR-816L and CVE-2020-15893. By exploiting these flaws, an attacker can easily activate a command injection vulnerability with an, especially crafted M-SEARCH packet.

Vulnerabilities detected

According to report, they have detected a total of five vulnerabilities, and we have mentioned the name and the type of vulnerability below:-

 
  • CVE-2020-15892: It is a stack-based buffer overflow vulnerability.
  • CVE-2020-15893: It is a command injection vulnerability.
  • CVE-2020-15894: It is a sensitive information exposure vulnerability.
  • CVE-2020-15895: It is a Cross-Site Scripting (XSS) vulnerability.
  • CVE-2020-15896: It is a Sensitive Information Exposure/Authentication Bypass Backdoor vulnerability.

Over 55,000 D-Link devices have remotely accessible web interfaces, while the DAP-1522 enables you to effortlessly correlate at least 4 Ethernet-enabled devices in your production center and to your wireless network.

In the case of CVE-2020-15896, routers are generally run on publicly available IPs; it gets typically the parameters ‘NO_NEED_AUTH=1’ and ‘AUTH_GROUP=0’ to the URL. Then it works as a backdoor and bypasses the necessity to log in to the admin interface. 

Whereas the CVE-2020-15894 affecting Bx hardware devices involves entering the URL on the router’s IP, and it runs on the firmware 2.06 & 2.06.B09_BETA. 

Apart from this, the CVE-2020-15893 is included with the capability to perform arbitrary powers that are given by the attacker with a way to the router’s IP through UPnP crafted “M-SEARCH” packets.

After detection all the vulnerability, the D-Links has initially, provided the firmware version for each flaw and their hardware devices. According to the D-Links, all five vulnerability has been detected on July 22, 2020. 

As per the DAP-1522 and DIR-816L, D-Links has not provided any support phase as they have reached their “End-of-support” period. But, still, the company has issued an “Exceptional Beta Patch Release” so that users can upgrade their firmware version without any problem.

To read the original article:

https://cybersecuritynews.com/d-link-security-bug/

Top

Interdit de copier  ce contenu