The document describes an authentication bypass vulnerability in multiple D-Link router models (DIR-300, DIR-320, DIR-615 revD) due to improper session handling in PHP-based web interfaces. It provides a proof-of-concept URL that bypasses authentication by manipulating query parameters.
Classification
Writeup 90%
Target:
D-Link DIR-300, DIR-320, DIR-615 revD (all firmware versions)
No auth needed
Prerequisites:
Network access to the router's web interface · Knowledge of the router's IP address