Vulnerability & Exploit Database

Back to search

D-Link Cookie Command Execution

This module exploits an anonymous remote upload and code execution vulnerability on different D-Link devices. The vulnerability is a command injection in the cookie handling process of the lighttpd web server when handling specially crafted cookie values. This module has been successfully tested on D-Link DSP-W110A1_FW105B01 in emulated environment.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/linux/http/dlink_dspw110_cookie_noauth_exec

Authors

  • Peter Adkins <peter.adkins [at] kernelpicnic.net>
  • Michael Messner <devnull [at] s3cur1ty.de>

References

Targets

  • MIPS Little Endian
  • MIPS Big Endian

Platforms

  • linux

Architectures

  • mipsle
  • mipsbe

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/dlink_dspw110_cookie_noauth_exec msf exploit(dlink_dspw110_cookie_noauth_exec) > show targets ...targets... msf exploit(dlink_dspw110_cookie_noauth_exec) > set TARGET <target-id> msf exploit(dlink_dspw110_cookie_noauth_exec) > show options ...show and set options... msf exploit(dlink_dspw110_cookie_noauth_exec) > exploit