Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2015-7245 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Directory Traversal vulnerability in D-Link routers. πŸ“‰ **Consequences**: Remote attackers can read sensitive information via the `errorpage` parameter using `..` sequences.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper input validation in the `errorpage` parameter. It fails to sanitize `../` (dot dot) sequences, allowing path traversal. πŸ› **Flaw**: Local File Inclusion (LFI) logic error.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Product**: D-Link DVG-N5402SP (VoIP Wireless Router). πŸ“œ **Specific Versions**: Firmware **W1000CN00**, **W1000CN03**, and **W2000EN00D**.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Action**: Remote Information Disclosure. πŸ”“ **Impact**: Access to sensitive files on the device. No privilege escalation mentioned, just data theft.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. It is a **Remote** vulnerability. No authentication or special configuration is required to exploit the `errorpage` parameter.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploitation**: **YES**. Public PoCs exist on GitHub (Nuclei templates) and Exploit-DB (ID 39409). Wild exploitation is possible via simple HTTP requests.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for the D-Link DVG-N5402SP model. Check firmware versions against the list. Use Nuclei templates to test the `errorpage` parameter for `../` injection.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Official patches are implied by the version specificity. Users must update firmware to versions **not** listed in the affected range (W1000CN00/03, W2000EN00D).

Q9What if no patch? (Workaround)

🚧 **No Patch?**: If unpatched, restrict external access to the router's web interface. Monitor logs for unusual `errorpage` parameter requests containing `..`.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. It is a remote, unauthenticated LFI vulnerability with public exploits. Immediate patching or network isolation is recommended.