-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 TITLE: Security flaw in DLINK 614+ - SOHO routers (http://www.dlink.com) TYPE: Script injection over DHCP QUOTE from DLINK: The AirPlus DI-614+ combines the latest advancements in 802.11b silicon chip design from Texas Instruments, utilizing their patented Digital Signal ProcessingTM technology, and D-Link?s own robust firewall security features. ... A simple yet intelligent, web-based setup wizard makes the DI-614+ easy for any user to quickly and securely connect computers to share a high-speed Internet connection, files, resources, games or just to communicate. An integrated 4-port switch allows direct connection of up to four computers. Several wireless clients can also securely connect to the network using 64, 128, or 256-bit encryption. ... The D-Link AirPlus DI-614+ is the ideal networking solution for small offices, home offices, schools, coffee shops and other small businesses that cater to the public. DETAILS: The DI-614+ SOHO router (latest firmware rev 2.30) suffers a "script injection over dhcp" vulnerability. Using DHCP as a vector, arbitrary and malicious scripting can be injected into the DHCP administrative and logs pages (if enabled) Scripting sent in such a way will be executed on behalf of the unaware administrator when he consult the web based management interface and lead to the complete compromising of the firewall/router giving full access to the administrative account. The DI-614+ does not filter user supplied data passed through the DHCP HOSTNAME option. Basically, it first truncates the string to 20 characters and displays it AS IS in the DHCP and log pages opening a large hole that can easily be exploited for instance: to change the administrator password (doesn't require his current password), to reboot the box, to reset the box's factory settings. Because the DLINK 614+ is used, among others, by coffee shops, a successful exploitation may have very serious impact. EXPLOITATION: As an example, one can inject a script designed to force the administrator into restoring the box default settings using this nasty little script: