D-Link DIR-601 TFTP Directory Traversal Vulnerability

Credit: robkraus
Risk: High
Local: No
Remote: Yes

CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

D-Link DIR-601 TFTP Directory Traversal Vulnerability Solutionary ID: SERT-VDN-1013 Risk Rating: High CVE ID: CVE-2011-4821 Product: D-Link DIR-601 Wireless N 150 Home Router Application Vendor: D-Link Vendor URL: http://www.dlink.com Date discovered: 12/05/2011 Discovered by: Rob Kraus and Solutionary Engineering Research Team (SERT) Vendor notification date: 12/05/2011 Vendor response date: No Response Vendor acknowledgment date: No Response Public disclosure date: 01/20/2012 Type of vulnerability: Directory Traversal - Arbitrary File Access - Read Only Access Exploit Vectors: Local and Remote Vulnerability Description: Default installation of the DIR-601 Wireless N 150 Home Router is susceptible to directory traversal attack. A attacker can exploit this vulnerability to retrieve files outside of the TFTP server root directory. The attack is performed against the TFTP server listening on the WAN interface and does not require prior authentication. At this time it appears the vulnerability allows read-only access to files. Tested on: D-LINK 601 - Attacked using linux platform Affected software versions: Firmware Version 1.02NA Impact: A remote attacker may be able to leverage this vulnerability to gain access to system and other configuration files resulting in loss of confidentiality. Fixed in: Not Fixed Remediation guidelines: Disable TFTP server access and update the system should a patch become available from the vendor.



Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com


Back to Top