Confidentiality class: Internal & Partner ======================================================================= title: Cross Site Request Forgery product: DIR-868L vulnerable version: 1.12 fixed version: 1.20B01 impact: Medium homepage: http://www.dlink.com/ found: 2018-02-18 by: S. Tripathy ======================================================================= Vendor description: ------------------- "Founded in 1986, D-Link is a global leader in the design, manufacture and marketing of advanced networking, broadband, digital, voice and data communications solutions. Following our company motto, aBuilding Networks for Peoplea, D-Link continually meets the global networking and connectivity needs of digital home consumers, small office professionals, small to medium-sized businesses, and enterprise environments." Source: http://www.dlink.com.sg/about-d-link/ User recommendation: ------------------------ It's recommended to the user's not to open/use any other URL/Webpage while working on the administration page of DLink DIR-868L router. Vulnerability overview/description: ----------------------------------- 1) Cross Site Request Forgery An attacker can use cross-site request forgery vulnerability to perform arbitrary web requests with the identity of the victim without being noticed by the victim. Proof of concept: ----------------- 1) Cross Site Request Forgery A malicious HTML file can be hosted in an attacker's controlled server, once an authenticated victim vists the malicious website/URL, the payload will get executed, and some actions will be performed, such as changing the administration password in the worst case. Example of an malicious HTML file: (The following CSRF PoC can be used to change some router settings and can be modified to change the Admin password) ====================================================================================================================