This is a detailed technical writeup describing multiple vulnerabilities in various D-Link devices, primarily focusing on unauthenticated and authenticated command injection via the 'dst' parameter in diagnostic.php. It includes affected firmware versions, exploit examples, and mitigation steps.
Classification
Writeup 95%
Target:
D-Link DIR-600, DIR-300 revB, DIR-815, DIR-645, DIR-412, DIR-456, DIR-110
No auth needed
Prerequisites:
Network access to the vulnerable device · Knowledge of the target device's IP address