{"id":7570,"date":"2021-01-08T21:03:17","date_gmt":"2021-01-09T04:03:17","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7570"},"modified":"2023-04-05T12:41:27","modified_gmt":"2023-04-05T19:41:27","slug":"securin-disclosed-4-hardcoded-credentials-on-d-link-products","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/securin-disclosed-4-hardcoded-credentials-on-d-link-products\/","title":{"rendered":"Securin (previously CSW) Disclosed 4 Hardcoded Credentials on D-Link Products"},"content":{"rendered":"
Asset and lifecycle management are complex initiatives that organizations should keep pace with as products reach the end of life (EOL) or end of support (EOS) and become obsolete. This obsolescence gives rise to security vulnerabilities that could be exploited by threat actors.\u00a0<\/span><\/span><\/p>\n\nCyber Security Works discovered four such vulnerabilities in D-Link Models – CVE-2020-29321,\u00a0CVE-2020-29322,\u00a0CVE-2020-29323, and\u00a0CVE-2020-29324\u00a0on August 17,2020.<\/span><\/span><\/p>\n<\/blockquote>\nDetection<\/span><\/strong><\/span><\/h2>\nCyber Security researchers have reported telnet hardcoded credentials in four firmware in D-Link models listed below:<\/span><\/span><\/p>\n\n- \n
D-Link Router DIR-868L-Telnet<\/span><\/span><\/p>\n<\/li>\n- \n
D-Link Router DIR-880L-Telnet<\/span><\/span><\/p>\n<\/li>\n- \n
D-Link Router DIR-885L-MFC<\/span><\/span><\/p>\n<\/li>\n- \n
D-Link Router DIR-895L MFC<\/span><\/span><\/p>\n<\/li>\n<\/ol>\nDisclosure\u00a0<\/span><\/span><\/strong><\/h2>\nThe vulnerability was reported to the vendor on 08\/18\/2020. The CSW team reported unauthenticated credential disclosure through decompilation of firmware in the following devices –<\/span><\/span><\/p>\n\n- \n
DIR-868L Rev. C1 – FW v3.01\u00a0<\/span><\/span><\/p>\n<\/li>\n- \n
DIR-880L Rev. Ax – FW v1.07\u00a0<\/span><\/span><\/p>\n<\/li>\n- \n
DIR-885L Rev. Ax – FW v1.15b02\u00a0<\/span><\/span><\/p>\n<\/li>\n- \n
DIR-895L Rev. Ax – FW v1.21b05\u00a0<\/span><\/span><\/p>\n<\/li>\n<\/ol>\nTimeline<\/span><\/strong><\/h2>\n\n\n\nDate\u00a0<\/strong><\/span><\/span><\/td>\n\u00a0Description<\/strong><\/span><\/span><\/td>\n<\/tr>\n\nAugust 17,2020<\/span><\/span><\/td>\n | Discovered in our research lab<\/span><\/span><\/td>\n<\/tr>\n\nAugust 18,2020<\/span><\/span><\/td>\n | Vulnerability reported to Vendor who acknowledged the same<\/span><\/span><\/td>\n<\/tr>\n\nAugust 20, 2020<\/span><\/span><\/td>\n | Vendor responded saying “elevated to D-Link Corporation<\/span><\/span><\/td>\n<\/tr>\n\nSep 4, 2020<\/span><\/span><\/td>\n | Follow up<\/span><\/span><\/td>\n<\/tr>\n\nSep 7, 2020<\/span><\/span><\/td>\n | Vendor responded saying need more time to review and response from R&D\u00a0\u00a0<\/span><\/span><\/td>\n<\/tr>\n\nSep 10, 2020<\/span><\/span><\/td>\n | Vendor responded with a support announcement <\/span><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n <\/p>\n Incident Analysis<\/span><\/strong><\/span><\/h2>\nMultiple vulnerabilities have been discovered in D-Link models, the most severe of which could allow arbitrary code execution.\u00a0<\/span><\/span>The status of the devices reported are End of Support (“EOS”), also known as End of Life (“EOL”). As a general policy, when a product reaches EOS\/EOL, it can no longer be supported, and all firmware development for the product ceases. Products\u00a0purchased in the US that have reached EOS\/EOL are moved to the Legacy Products site (legacy.us.dlink.com) which is the final archive as of the EOS\/EOL date.<\/span><\/span><\/p>\n\n\n\nModel<\/strong><\/span><\/span><\/td>\nRegion<\/strong><\/span><\/span><\/td>\nHardware Revision<\/strong><\/span><\/span><\/td>\nLast Sales Date<\/strong><\/span><\/span><\/td>\nEnd of Support<\/strong><\/span><\/span><\/td>\n<\/tr>\n\nDIR-868L<\/span><\/span><\/td>\n | Globally<\/span><\/span><\/td>\n | A1\/A2\/B1\/C1<\/span><\/span><\/td>\n | n\/a<\/span><\/span><\/td>\n | 06\/30\/20<\/span><\/span><\/td>\n<\/tr>\n\nDIR-868L<\/span><\/span><\/td>\n | Only USA<\/span><\/span><\/td>\n | A1<\/span><\/span><\/td>\n | 10\/31\/18<\/span><\/span><\/td>\n | 08\/07\/20<\/span><\/span><\/td>\n<\/tr>\n\nDIR-880L<\/span><\/span><\/td>\n | Globally<\/span><\/span><\/td>\n | A1\/A2<\/span><\/span><\/td>\n | n\/a<\/span><\/span><\/td>\n | 01\/10\/19<\/span><\/span><\/td>\n<\/tr>\n\nDIR-880L<\/span><\/span><\/td>\n | Only USA<\/span><\/span><\/td>\n | A1\/A2<\/span><\/span><\/td>\n | 02\/12\/19<\/span><\/span><\/td>\n | 08\/07\/20<\/span><\/span><\/td>\n<\/tr>\n\nDIR-885L\/R<\/span><\/span><\/td>\n | Globally<\/span><\/span><\/td>\n | A1\/A2\/A3<\/span><\/span><\/td>\n | n\/a<\/span><\/span><\/td>\n | 01\/10\/19<\/span><\/span><\/td>\n<\/tr>\n\nDIR-885L\/R<\/span><\/span><\/td>\n | Only USA<\/span><\/span><\/td>\n | A1<\/span><\/span><\/td>\n | 02\/12\/19<\/span><\/span><\/td>\n | 08\/07\/20<\/span><\/span><\/td>\n<\/tr>\n\nDIR-885L\/R<\/span><\/span><\/td>\n | Globally<\/span><\/span><\/td>\n | A1\/A2\/A3<\/span><\/span><\/td>\n | n\/a<\/span><\/span><\/td>\n | 01\/10\/19<\/span><\/span><\/td>\n<\/tr>\n\nDIR-885L\/R<\/span><\/span><\/td>\n | Only USA<\/span><\/span><\/td>\n | A1<\/span><\/span><\/td>\n | 12\/08\/16<\/span><\/span><\/td>\n | 08\/07\/20<\/span><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\nVulnerability Analysis<\/span><\/span><\/strong><\/h2>\nThe telnet hardcoded default credentials are the vulnerable elements in the firmware of DIR-868L, DIR-880L, DIR-885L\/R, and DIR-895L\/R.<\/span><\/p>\nProof of Concept<\/span><\/strong><\/span><\/h2>\nVulnerability Name:<\/strong> Telnet Hardcoded credentials<\/span><\/span><\/p>\nSeverity:<\/strong> High<\/span><\/span><\/p>\nSteps to Reproduce<\/span><\/strong><\/span><\/h2>\nStep 1:<\/strong> Extract the firmware<\/span><\/span><\/p>\nStep 2:<\/strong> Run the command cat etc\/init0.d\/S80telnetd.sh to get the username and the location of the variable used for storing the password. \nStep 3:<\/strong> Run the command cat etc\/config\/image_sign to get the password<\/span><\/span><\/p>\n<\/p>\n Figure 1: Clear text showing username<\/span><\/strong><\/span><\/p>\n<\/span><\/span><\/p>\nFigure 2: The password is printed in the terminal<\/span><\/strong><\/span><\/p>\nExploited D-Link firmware with hardcoded default credentials<\/span><\/strong><\/span><\/h2>\n | | | | | | | | | | | | | | | | | | | | |