Sploit.io - Search

Product: D-Link Router DIR-885L-MFC, version: 1.15b02,v1.21b05

CVE-2020-29323

Severity: Unknown

Description: The D-link router DIR-885L-MFC 1.15b02, v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.008320000
  • Percentile: 0.741610000
  • Date: 2026-01-01

ExploitDB

No data available.

HackerOne Data

  • Rank: 8512
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • n/a D-Link Router DIR-885L-MFC - Versions: 1.15b02,v1.21b05

    References:

    Risk Assessment

    1. Risk Assessment
    The D-Link DIR-885L-MFC router, versions 1.15b02 and 1.21b05, is vulnerable to hardcoded credentials discoverable through firmware decompilation of the telnet service. This represents a medium to high risk, as it allows an unauthenticated attacker to gain access to the router’s firmware and extract sensitive data. The nature of the vulnerability is a relatively straightforward one – the credentials are baked into the firmware itself, making discovery achievable with moderate effort. The likelihood of exploitation is moderate, as it requires some technical skill in firmware analysis but doesn’t necessitate complex network conditions or zero-day exploits. The ease of exploitation is also moderate, as decompilation tools are readily available. Impact on confidentiality is high, as sensitive data like Wi-Fi passwords, potentially stored network configurations, and other firmware secrets could be exposed. Integrity is moderately impacted, as an attacker gaining access could potentially modify the firmware. Availability is moderately impacted, as an attacker might disrupt service through firmware modifications or resource exhaustion. The EPSS score of 0.008320000 suggests a relatively low but not insignificant probability of exploitation given the prevalence of these routers.

    2. Potential Attack Scenarios
    An attacker, leveraging the vulnerability, could initiate a telnet connection to the router. They could then download the firmware image and decompile it using readily available tools like Binwalk or Ghidra. During decompilation, the attacker can search for common username/password combinations or strings indicative of credentials. Once discovered, these credentials allow the attacker to gain full access to the router’s configuration via telnet. The attacker could then change the Wi-Fi password, redirect network traffic, or even install malicious firmware, potentially compromising all devices on the network. This scenario assumes the telnet service is enabled, which is often the default or easily enabled on these devices. The attacker doesn’t need to know any existing credentials to begin the process, making it a particularly appealing attack vector for opportunistic attackers.

    3. Mitigation Recommendations
    The primary mitigation for this vulnerability is to update the router firmware to a version that addresses the hardcoded credentials. D-Link should release a new firmware version to resolve this issue. Until a patch is available, consider disabling the telnet service if it’s not essential. This can be done through the router’s web interface. If telnet must remain enabled, implement strong password policies for the router’s administrative interface to limit the impact of a potential compromise. Regularly monitor network traffic for suspicious activity originating from the router. Further resources and information can be found at: https://cybersecurityworks.com/zerodays/cve-2020-29323-telnet-hardcoded-credentials.html and https://packetstormsecurity.com/search/?q=CVE-2020-29323.

    4. Executive Summary
    The D-Link DIR-885L-MFC router is susceptible to a vulnerability that allows attackers to discover hardcoded credentials within the firmware, potentially granting them full control of the router and the network it serves. This vulnerability allows an attacker to gain access without knowing the existing password, simply by decompiling the firmware. The potential impacts include compromised Wi-Fi passwords, network traffic redirection, and even the installation of malicious firmware. While the likelihood of exploitation is moderate, the potential business impact is significant, potentially leading to data breaches, network disruptions, and loss of customer trust. We recommend updating the router firmware as soon as a patch is available, and disabling the telnet service if not essential. Addressing this vulnerability is crucial to maintaining the security and integrity of our network infrastructure and protecting sensitive data.