D-Link DSR-250N devices before 1.08B31 allow remote authenticated users to obtain "persistent root access" via the BusyBox CLI, as demonstrated by overwriting the super user password.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
http://www.exploit-db.com/exploits/22930/ | third party advisory vdb entry exploit |
ftp://ftp2.dlink.com/PRODUCTS/DSR-250N/REVA/DSR-SERIES_RELEASE_NOTES_v3.14.pdf | release notes vendor advisory |
https://packetstormsecurity.com/files/118355/D-Link-DSR-250N-Backdoor.html | third party advisory vdb entry exploit |