D-LINK路由器后门漏洞测试方法

国家互联网应急中心

http://www.cert.org.cn/publish/main/9/index.html

多款D-LINK路由器产品存在后门漏洞

(受影响的D-LINK路由固件版本涉及DIR-100、DI-524、DI-524UP、DI-604S、DI-604UP、DI-604+、TM-G5240、TM-G5240、BRL-04R、BRL-04UR、BRL-04CW、BRL-04FWU)

        D-LINK部分路由器使用的固件版本中存在一个人为设置的后门漏洞(收录编号:CNVD-2013-13777)。攻击者通过修改User-Agent值为“xmlset_roodkcableoj28840ybtide”(没有引号)即可绕过路由器Web认证机制取得后台管理权限。取得后台管理权限后攻击者可以通过升级固件的方式植入后门,取得路由器的完全控制权。



D-LINK太狠了, HTTP消息头改个值就能绕过验证 ,如果你用的Google Chrome浏览器,可以去Chrmoe网上应用店下一个Header Hacker插件(https://chrome.google.com/webstore/detail/header-hacker/phnffahgegfkcobeaapbenpmdnkifigc/related)做测试

设置如下替换:



先用Chrome登陆你的D-LINK路由,shift+ctrl+c打开chrome自带的调试工具,选择network标签,刷新网页(在打开调试工具的情况下刷新),刷新后在左边找到该网页url,点击后右边选择headers,就可以看到当前网页的http头了, 比如:

Request Headersview source
Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding:gzip,deflate,sdch
Accept-Language:zh-CN,zh;q=0.8
Cache-Control:max-age=0
Connection:keep-alive
Host:192.168.1.1
User-Agent:Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.117 Safari/537.36


勾选插件刚才设置的替换值:


在打开调试工具的情况下刷新页面,观察HTTP的发送头(Request Headers)的User-Agent值是否改变,如:

  1. Cache-Control:
    max-age=0
  2. Connection:
    keep-alive
  3. Host:
    192.168.1.1
  4. User-Agent:
    xmlset_roodkcableoj28840ybtide <--------------已改变 说明插件改变成功

应为使用的不是D-Link路由,不知道会出现什么界面,大家自行测试吧,别用于非法用途就好.



  • 1
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
支持以下路由器 * Linksys WRT54GL (With original firmware or Tomato firmware), WRT54G (only some of them), WRT160N, WRT320N, and possibly similar models. * Linksys E5200 * Linksys E2000 * Linksys RV082 * Linksys E2500 * Linksys N1500 * Linksys E900 * Cisco-Linksys E4200 * Cisco Linksys E1000 v2.1 * Edimax BR6204WG, and possibly similar models. * Siemens ADSL SL2-141, and possibly similar models. * Siemens CL-110 PSTN ADSL2+ * Dynalink RTA1025W, and possibly similar models. * NETGEAR WGT624, WGR614v9, WNR1000v3, WNR3500L, and possibly other models. * NETGEAR DEVG2020 * ASUS WL-520g, WL-600g, and possibly similar models. * ASUS RT-N10+ , and possibly similar models. * Asus RT-N56U , and possibly similar models. * Asus RT-AC66U * Asus RT-AC68U * Asus RT-AC68W * Asus RT-N66U * D-Link DIR-655, DIR-300, and possibly similar models. * Sanex SA 5100, and possibly similar models. * Sitecom WL-351, WL-575, WL-312, and possibly similar models. * COMTREND 536+ (Only Internet Login) * US Robotics 9108 ADSL (internet login and admin login) * D-Link DSL-2540U/BRU/D ADSL2+, DSL-2650U, DSL-520B * D-Link DVA-G3170i/PT * D-Link DSL-604T * D-Link G3670B * D-Link DSL-2640T * D-Link DSL-G684T * D-Link DSL-2500U * D-Link 2740B * D-Link DIR-615 G2 * D-Link WBR-1310 * D-Link DSL-2543B * D-Link DI-524 * D-Link DI-624+A * D-Link DIR-600 * D-Link DIR-300 * D-Link DSL-2780 * D-Link DIR-605L * TL-WDR4300 N750 * TP-Link TD-8810 ADSL Modem/Router. * Dynamode R-ADSL-C4-W-G1 * NetComm NB5Plus4 DSL * Thomson TG580 DSL (only in Hex Dump mode) * Asus RT-G31 * HuaWei EchoLife HG520 * Huawei Echolife HG510a/HG520s/HG520b/HG520c * HuaWei HG526 * HuaWei-3Com Aolynk BR104 * TP-LINK TL-WR841N * TP-LINK TL-WR841DN * TP-LINK TL-MR342 * TP-LINK TL-WR340G * TP-LINK TL-R460 * TP-LINK TL-WR741ND v2.0 * TP-LINK TL-WR700N * TP-LINK TL-WR740N * TP-LINK TL-WA801N * TP-LINK TL-WR541G * TP-LINK TL-WR1043ND * TP-LINK TD-W8960N * TP-Link TL-WR941ND * TP-Link TL-MR3220 * TP-Link TL-WR642G * TP-Link TL-WDR3320 * TP-Link TL-WDR3600 * TP-LINK TL-WR720N * TP-Link TD-W8970 * TP-LINK TD-W8901N * TP-LINK TD-8816 * TP-LINK TD-W8901G * TP-LINK TD-W8951ND * TP-Link TD-8840 * TP-LINK TD-8817 * TP-LINK Archer C2 * TP-LINK Archer D5 * TP-LINK Archer D9 * TP-LINK Archer C9 * Belkin N+ (F5D8236uk4) * Mercury MW54R * Netgear DG632 * Netgear Wireless Cable Voice Gateway CG3000/CG3100 * Netgear WNDR4000 (Rev 1) * Netcomm NB6W * Aztech DSL605EW * Comtrend CT-5072T ADSL2+ modem/router * Small Business RV042 * Intelbras WRN240 * ipTIME N604V * Linksys WRV200 * Sagem F@ST2404 * ZTE ZXV10 * ZTE ZXHN H108N * SmartAX MT880a/MT880d/MT882a * Zyxel AMG1302 * Zyxel P-2612HWU-F1 * Alcatel Lucent I-240W-A * LevelOne WBR-3406TX v2
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值