An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/44388/ | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2018/Mar/66 | third party advisory mailing list |
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111 |