Back to all zero days
D-Link Router DIR-868L Telnet Hardcoded credentials
18th Aug, 2020
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
Proof of concept: (POC)
The telnet hardcoded default credentials are the vulnerable elements in the firmware of DIR-868L.
Step 1: Extract the firmware
Step 2: Run the command cat etc/init0.d/S80telnetd.sh to get the username and the location of the variable used for storing the password.
Figure 1: Clear text username as shown in screenshots
Step 3: Run the command cat etc/config/image_sign to get the password
Figure 2: Clear text password as shown in screenshots
A successful exploit could allow the attacker to gain access to the firmware and to extract sensitive data.
D-Link released a support announcement in response to the recommendations provided by CSW team for these D-Link products - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10189
Aug 17, 2020: Discovered in our research lab
Aug 18, 2020: Vulnerability reported to vendor and vendor acknowledged the vulnerability
Aug 20, 2020: Vendor responded saying "elevated to D-Link Corporation".
Aug 26, 2020: Follow up
Aug 28, 2020: Vendor responded saying "should have an update in next few Days"
Sep 4, 2020: Follow up
Sep 7,2020: Vendor responded saying need more time to review and response from R&D
Sep 10, 2020: Vendor responded with a support announcement.
Cyber Security Works Pvt. Ltd.
- Affected VendorD-Link
- Bug NameTelnet Hardcoded credentials
- CVE NumberCVE-2020-29321
- CWE IDCWE - 798
- CSW ID2020-CSW-08-1047
- CVSSv3 Score8.1
- Affected Version3.01
- Affected ProductD-Link