Post

Hacking the dlink DIR-615 for fun and no profit Part 2: CVE-2020–10215

Hi. This is my second writeup on my hacking the dlink dir-615 series as i try to get my first cve. I found more vulns and will also make a writeup on it soon so stay tuned. So lets get started

I started up by reversing the httpd server of the dlink dir 615 firmware https://www.dlink.com.ph/dir-615/. What im doing when reversing, is following all user inputs. The function for getting the value of a post parameter is get_cgi so i just viewed all the cross references to get_cgi. While doing so, i found an interesting function sub_412e2c .

What it does is it takes the user input is the post parameter named dns_query_name using get_cgi then store it to the register $s4

Then this $s4 is used as an argument to _system

For those who dont know, _system is like a mixture of system and sprintf. It combined formatting and system in one command. Here, we can see that our input in **$s4 **is directly inserted into the format string making it vulnerable to command injection. Now we know that the parameter dns_query_name is vulnerable but we still dont know the vulnerable endpoint.

If we look at the top, we can see that it called the function __assert with one of the arguments being do_dns_query_cgi

I am not sure yet what __assert do but looking on other calls to it, i think it is the function responsible for getting the endpoint. For example

Here, it calls __assert with one of the argument being do_log_first_page_cgi. We can see that there is an endpoint called log_first_page.cgi

Another example is here

It calls __assert once again and an argument ping_response_cgi and we can see that there is indeed an endpoint called ping_response.cgi

So in our vulnerable function, it is safe to assume that the vulnerable endpoint is dns_query.cgi

So now, lets test it out. I emulated the firmware using firmware analysis toolkit and tried the bug that we found.

So we now know, that we should make a post request to dns_query.cgi, and we should add a parameter called dns_query_name which is vulnerable to command injection.

So i tried it up with burpsuite, i used the command ;echo poc > /tmp/test;. What this will do is that this will add a file in /tmp and echo poc into it. Lets test it out

And it worked

We successfully echoed out poc in the file /tmp/test meaning we have a command injection.

BONUS BUG: POST BASED REFLECTED XSS:

On the same function, i also found another bug. It is a post based reflected xss.

We can see that it get the value of html_response_page and store it to the register $s2. Then it is used as an argument to wprintf

Its value is formatted the the response with no filtering. The text where our $s2 is formatted is <html><head></head></html> . So lets test it out

We can see that our input is reflected. Lets try to escape the string and inject our own xss

It works. Now lets make a csrf poc for this and test it in real browser

It works. Now we have a post based reflected xss. In my opinion, this is pretty useless since there is no cookies to steal. But it is there so we’ll take it

So in this writeup, we found a os command injection and a reflected xss. After googling it, i found out that the os command injection is already a cve for dir-825. CVE-2020–10215, so we cant get a cve from it :sad: . The other bug, xss, cve.mitre.org dont accept xss except for stored xss on their cve so we cant get a cve from that too. So no cve for me

Thanks for reading. I will make writeup on my other findings in the future.

Join the discord server: https://discord.gg/bugbounty

This post is licensed under CC BY 4.0 by the author.