D-Link DIR-615 Remote Exploit

D-Link’s DIR-615 Wireless N Router (http://www.dlink.com/products/?pid=565) contains a flaw that allows attackers to access administrative functions without authorization. By simply requesting a certain URL, this vulnerability can be used to perform numerous attacks including changing the admin password, disabling wireless security, and changing DNS settings.

The hole is confirmed in firmware version 3.10NA.

Example (changes admin password to ‘pwdpwd’):
Change password on 192.168.0.1

5 thoughts on “D-Link DIR-615 Remote Exploit”

  1. Hi there, I have a DIR-615 Hardware Version C1 running Firmware 3.10NA and none of these exploits affect my router. Am I doing something wrong or is my router patched some how?

    Thanks

Leave a Reply

Your email address will not be published. Required fields are marked *