Vulnerability Details : CVE-2017-3191
D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 are vulnerable to authentication bypass of the remote login page. A remote attacker that can access the remote management login page can manipulate the POST request in such a manner as to access some administrator-only pages such as tools_admin.asp without credentials.
Vulnerability category: Input validation
Products affected by CVE-2017-3191
- cpe:2.3:o:d-link:dir-130_firmware:1.23:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dir-330_firmware:1.12:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-3191
54.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-3191
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-3191
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).Assigned by: cret@cert.org (Secondary)
References for CVE-2017-3191
-
https://www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/
D-Link DIR-130 and DIR-330 routers vulnerable | SC MediaPress/Media Coverage
-
https://www.wilderssecurity.com/threads/d-link-dir-130-and-dir-330-are-vulnerable-to-authentication-bypass-and-do-not-protect-credentials.392703/
D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentials | Wilders Security ForumsIssue Tracking;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/123293
D-Link DIR-130 and DIR-330 tools_admin.asp security bypass CVE-2017-3191 Vulnerability ReportVDB Entry
-
https://www.kb.cert.org/vuls/id/553503
VU#553503 - D-Link DIR-130 and DIR-330 are vulnerable to authentication bypass and do not protect credentialsIssue Tracking;Third Party Advisory;US Government Resource
Jump to