Unauthenticated Credential Disclosure through Decompilation of D-Link Firmware (CVE-2020-29321)
Introduction
Telnet credentials can be extracted from firmware of vulnerable D-Link devices like:
DIR-868L Rev. C1 - FW v3.01 (CVE-2020-29321)
DIR-880L Rev. Ax - FW v1.07 (CVE-2020-29322)
DIR-885L Rev. Ax - FW v1.15b02 (CVE-2020-29323)
DIR-895L Rev. Ax - FW v1.21b05 (CVE-2020-29324)
Analysis
1. Extract filesystem from firmware:
binwalk -eM DIR868LC1_FW301b08.bin
2. Obtain username from file squashfs-root/etc/init0.d/S80telnetd.sh. Username can be seen as Alphanetworks.
3. Get password from file squashfs-root/etc/config/image_sign. In case of DIR-868L password is wrgac35_dlink.2013gui_dir868lc.
Comments
Post a Comment