An issue was discovered on the D-Link DWR-932B router. WPS PIN generation is based on srand(time(0)) seeding.
The product uses a Pseudo-Random Number Generator (PRNG) but does not correctly manage seeds.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
https://pierrekim.github.io/blog/2016-09-28-dlink-dwr-932b-lte-routers-vulnerabilities.html | exploit third party advisory technical description |
http://www.securityfocus.com/bid/95877 | vdb entry third party advisory broken link |