D-Link DIR-300 authentication bypass

2010-11-09 Thread Karol Celiński
$f=fopen("answer.html","w"); fwrite($f,$out); fclose($f); exit; } else echo "+ ok, now you can login using l: admin p:$argv[3]\n"; ?> ---cut here--- [History] - Information sent to vendor 07.08.2010 -

Re: D-Link DIR-300 authentication bypass

2010-11-09 Thread Karol Celiński
ch); if(stripos($out,"login.php")===true) { echo "- something goes wrong (check answer - answer.html) !\n"; $f=fopen("answer.html","w"); fwrite($f,$out); fclose($f); exit; } else echo "+ ok, now you can login using l: admin p:$argv[3]\n"

Re: D-Link DIR-300 authentication bypass

2010-11-19 Thread Karol Celiński
lable firmwares. Propably, I will send test results to bugtraq in the next three weeks. If somebody has free time and those routers, help is welcome. Greetings, Karol Celiński. My GPG public key http://www.celin.pl/pub.asc Pentester/Researcher @ Safe Computing -BEGIN PGP SIGNATURE- Version:

Re: D-Link DIR-300 authentication bypass

2010-12-01 Thread Karol Celiński
-05B03_all_en_20101109.zip DIR-615 rev. D: ftp://ftp.dlink.pl/dir/dir-615/driver_software/DIR-615_fw_revD_4-13B01_all_en_20101201.zip It's not the end of list but we have to wait - they are working on it. Special thanks to Bartosz Kiziukiewicz from D-Link for his feedback. - -- Greetings,

Re: D-Link DIR-300 authentication bypass

2010-12-16 Thread Karol Celiński
-05B01_all_en_20101213.zip - -- Greetings, Karol Celiński. My GPG public key http://www.celin.pl/pub.asc Pentester/Researcher @ Safe Computing -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk0J/Q8ACgkQ4hKaO1FYep3fiwCgkbYKz4+4ovTt2qkeSwzCT6Fm