DHCP: HTML Tags in DHCP Request

This signature detects HTML tags embedded in the HOSTNAME field of a DHCP request. Attackers can use this technique to force the administrators of some DHCP servers to execute code when viewing logs with a HTML-parsing viewer.

Extended Description

It is reported that the DI-614+, DI-704, and the DI-624 are susceptible to an HTML injection vulnerability in their DHCP log. An attacker who has access to the wireless, or internal network segments of the router can craft malicious DHCP hostnames, that when sent to the router, will be logged for later viewing by the administrator of the device. The injected HTML can be used to cause the administrator to make unintended changes to the configuration of the router. Other attacks may be possible. Although only the DI-614+, DI-704, and the DI-624 are reported vulnerable, code reuse across devices is common and other products may also be affected.

Affected Products

D-link di-624_soho_router

Short Name
DHCP:EXPLOIT:HOSTNAME-HTML
Severity
Minor
Recommended
False
Recommended Action
None
Category
DHCP
Keywords
CVE-2004-0615 DHCP HTML Request Tags bid:10587 in
Release Date
10/21/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

D-link

CVSS Score

5.1

Found a potential security threat?