### [CVE-2017-3192](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3192) ![](https://img.shields.io/static/v1?label=Product&message=DIR-130&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DIR-330&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-522%3A%20Insufficiently%20Protected%20Credentials&color=brighgreen) ### Description D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 do not sufficiently protect administrator credentials. The tools_admin.asp page discloses the administrator password in base64 encoding in the returned web page. A remote attacker with access to this page (potentially through a authentication bypass such as CVE-2017-3191) may obtain administrator credentials for the device. ### POC #### Reference - https://www.kb.cert.org/vuls/id/553503 - https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/ #### Github No PoCs found on GitHub currently.