Unauthenticated Credential Disclosure through Decompilation of D-Link Firmware (CVE-2020-29321)

Introduction

Telnet credentials can be extracted from firmware of vulnerable D-Link devices like:

DIR-868L Rev. C1 - FW v3.01 (CVE-2020-29321)

DIR-880L Rev. Ax - FW v1.07 (CVE-2020-29322)

DIR-885L Rev. Ax - FW v1.15b02 (CVE-2020-29323)

DIR-895L Rev. Ax - FW v1.21b05 (CVE-2020-29324)

Analysis

1. Extract filesystem from firmware:

binwalk -eM DIR868LC1_FW301b08.bin

2. Obtain username from file squashfs-root/etc/init0.d/S80telnetd.sh. Username can be seen as Alphanetworks. 


3. Get password from file squashfs-root/etc/config/image_sign. In case of DIR-868L password is wrgac35_dlink.2013gui_dir868lc.



Demo

Comments

Popular posts from this blog

Decrypt TP-Link config.bin Configuration Backup File

Firmadyne Installation & Emulation of Firmware

Extract / Create Cramfs File System from Ubuntu 20.04