In the "webupg" binary of D-Link DIR-825 G1, attackers can bypass authentication through parameters "autoupgrade.asp", and perform functions such as downloading configuration files and updating firmware without authorization.
Link | Tags |
---|---|
https://www.dlink.com/en/security-bulletin/ | vendor advisory |
https://github.com/tgp-top/D-Link-DIR-825 | third party advisory exploit |