Files
CVEs-PoC/2017/CVE-2017-3192.md
T
2025-09-29 21:09:30 +02:00

21 lines
1.1 KiB
Markdown

### [CVE-2017-3192](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3192)
![](https://img.shields.io/static/v1?label=Product&message=DIR-130&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=DIR-330&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.12%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.23%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-522%3A%20Insufficiently%20Protected%20Credentials&color=brightgreen)
### Description
D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 do not sufficiently protect administrator credentials. The tools_admin.asp page discloses the administrator password in base64 encoding in the returned web page. A remote attacker with access to this page (potentially through a authentication bypass such as CVE-2017-3191) may obtain administrator credentials for the device.
### POC
#### Reference
- https://www.kb.cert.org/vuls/id/553503
- https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/
#### Github
No PoCs found on GitHub currently.