An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf | third party advisory us government resource |
https://us.dlink.com/en/security-advisory | vendor advisory |
https://github.com/d0x0/D-Link-DIR-600M/blob/master/CVE-2019-13101 | third party advisory |
http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html | vdb entry third party advisory |
http://seclists.org/fulldisclosure/2019/Aug/5 | third party advisory mailing list |
https://seclists.org/bugtraq/2019/Aug/17 | third party advisory mailing list |