9.8
CVSSv3

CVE-2019-13101

Published: 08/08/2019 Updated: 23/04/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an malicious user to modify the data fields of the page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dir-600m firmware 3.02

dlink dir-600m firmware 3.03

dlink dir-600m firmware 3.04

dlink dir-600m firmware 3.06

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner include Msf::Auxiliary::Report def initialize(info = {}) super(update_info(info, ...

Mailing Lists

A remote vulnerability was discovered on D-Link DIR-600M Wireless N 150 Home Router in multiple respective firmware versions The vulnerability provides unauthenticated remote access to the router's WAN configuration page ie "wanhtm", which leads to disclosure of sensitive user information including but not limited to PPPoE, DNS configuration et ...

Github Repositories

Simple Python script for D-Link vulnerability scan and test [CVE-2019-13101]

DLKPloiT600py Simple Python script for D-Link vulnerability scan and test [CVE-2019-13101] (nvdnistgov/vuln/detail/CVE-2019-13101) (wwwcvedetailscom/cve/CVE-2019-13101/) (usdlinkcom/en/security-advisory) (wwwdlinkcom/en/security-bulletin) Requirements: python3x requests $ pip install -r requirementstxt Usage: $ python3 dlkpl