Skip to content

Instantly share code, notes, and snippets.

@idris159
Last active April 9, 2022 23:23
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save idris159/4c3ea746f4b19308b8ce8d8a7e313310 to your computer and use it in GitHub Desktop.
Save idris159/4c3ea746f4b19308b8ce8d8a7e313310 to your computer and use it in GitHub Desktop.
Gain privileges Bypass a restriction or similar in D-link DSL-2750U - P/N : ISL2750UEME3.V1E - Firmware Version : ME_1.03
[description]
> D-link DSL-2750U ISL2750UEME3.V1E devices allow approximately 90 seconds of access to the control panel, after a restart,
before MAC address filtering rules become active.
[Additional Information]
> Gain privileges Bypass a restriction or similar in D-link product
> DSL-2750U version P/N:ISL2750UEME3.V1E allows ATTACKER after configuring MAC filtering to prohibit access to my mac
WiFi address.
> - / I was able to access the D-link control panel via WiFi on the local network just after having physically restarted
the device.
> - / the interval of time that the modem authorizes access to the control panel is less than 90 seconds.
> - / the exploitation of this possible security flaw is local.
> [VulnerabilityType Other]
> Gain privileges Bypass a restriction or similar
> [Vendor of Product]
> D-link
> [Affected Product Code Base]
> D-link DSL-2750U - P/N : ISL2750UEME3.V1E - Firmware Version : ME_1.03
> [Attack Type]
> Local
> [Reference]
> CVE-2020-13150
> https://www.dlink.com/en/security-bulletin
confirmed by :
D-Link Corporation
No. 289, Xinhu 3rd Road
Neihu District, Taipei 11494
Taiwan
Discovered by idris SI-AHMED.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment