[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

D-LINK Central WifiManager (CWM 100) 1.03 r0098 Man-In-The-Middle Vulnerability

Author
hyp3rlinx
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31562
Category
remote exploits
Date add
09-11-2018
CVE
CVE-2018-15516
Platform
hardware
[+] Credits: John Page (aka hyp3rlinx)    
[+] Website: hyp3rlinx.altervista.org
[+] Source:  http://hyp3rlinx.altervista.org/advisories/DLINK-CENTRAL-WIFI-MANAGER-CWM-100-FTP-SERVER-PORT-BOUNCE-SCAN.txt
[+] ISR: ApparitionSec          
 

***Greetz: indoushka | Eduardo B.***


[Vendor]
us.dlink.com


[Product]
D-LINK Central WifiManager (CWM 100)
Version 1.03 r0098
http://us.dlink.com/products/business-solutions/central-wifimanager-software-controller/

D-Links free Central WiFiManager is a web-based wireless Access Point management tool, enabling you to create and manage multi-site, multi-tenancy wireless networks.


[Vulnerability Type]
FTP Server PORT Bounce Scan


[CVE Reference]
CVE-2018-15516


[Security Issue]
The FTP Server component of the D-LINK Central WifiManager can be used as a man-in-the-middle machine allowing PORT Command bounce scan attacks.
This vulnerability allows remote attackers to abuse your network and discreetly conduct network port scanning. Victims will then think these
scans are originating from the D-LINK network running the afflicted FTP Server and not you.


[Exploit/POC]
D-LINK CWM-100 FTP Server listens on port 9000 (default), default creds are "admin" "admin"

nmap -v -b admin:admin@VICTIM-IP:9000  <TARGET-IP> -p 21,22,23,53,445


[POC Video URL]
https://vimeo.com/299797225

#  0day.today [2024-11-14]  #