blog.vastart.dev/2022/02/10/d-link-router-cve-2021-27342-timing-side-channel-attack-vulnerability-writeup
Preview meta tags from the blog.vastart.dev website.
Linked Hostnames
7- 19 links toblog.vastart.dev
- 2 links togithub.com
- 2 links towww.dlink.com
- 1 link tomedium.com
- 1 link toprofiles.stanford.edu
- 1 link totwitter.com
- 1 link towww.linkedin.com
Thumbnail

Search Engine Appearance
D-Link Router CVE-2021-27342 Timing Side-Channel Attack Vulnerability Writeup
I recently bought a new DIR-842 home router, and immediately (as any hacker would) started toying with it - I can’t call it mine until I pop a shell on it. Rather quickly I found I can enable telnet through the admin web gui, and then connect to telnet with an admin user. But that was too easy, so let’s see if we can find a bug/vulnerability.
Bing
D-Link Router CVE-2021-27342 Timing Side-Channel Attack Vulnerability Writeup
I recently bought a new DIR-842 home router, and immediately (as any hacker would) started toying with it - I can’t call it mine until I pop a shell on it. Rather quickly I found I can enable telnet through the admin web gui, and then connect to telnet with an admin user. But that was too easy, so let’s see if we can find a bug/vulnerability.
DuckDuckGo
D-Link Router CVE-2021-27342 Timing Side-Channel Attack Vulnerability Writeup
I recently bought a new DIR-842 home router, and immediately (as any hacker would) started toying with it - I can’t call it mine until I pop a shell on it. Rather quickly I found I can enable telnet through the admin web gui, and then connect to telnet with an admin user. But that was too easy, so let’s see if we can find a bug/vulnerability.
General Meta Tags
8- titleD-Link Router CVE-2021-27342 Timing Side-Channel Attack Vulnerability Writeup | mavlevin
- charsetutf-8
- viewportwidth=device-width, initial-scale=1, minimum-scale=0.5, maximum-scale=5
- generatorJekyll v4.3.4
- authorMav Levin
Open Graph Meta Tags
8- og:imagehttps://mavlevin.com/assets/img/whtaguy_research_bg.png
- og:typewebsite
- og:titleD-Link Router CVE-2021-27342 Timing Side-Channel Attack Vulnerability Writeup
og:locale
en_US- og:descriptionI recently bought a new DIR-842 home router, and immediately (as any hacker would) started toying with it - I can’t call it mine until I pop a shell on it. Rather quickly I found I can enable telnet through the admin web gui, and then connect to telnet with an admin user. But that was too easy, so let’s see if we can find a bug/vulnerability.
Twitter Meta Tags
6- twitter:cardsummary
- twitter:titleD-Link Router CVE-2021-27342 Timing Side-Channel Attack Vulnerability Writeup
- twitter:descriptionI recently bought a new DIR-842 home router, and immediately (as any hacker would) started toying with it - I can’t call it mine until I pop a shell on it.Ra...
- twitter:cardsummary
- twitter:imagehttps://mavlevin.com/assets/img/whtaguy_research_bg.png
Link Tags
5- alternatehttps://mavlevin.com/feed.xml
- alternatehttps://mavlevin.com/feed.xml
- canonicalhttps://mavlevin.com/2022/02/10/D-Link-Router-CVE-2021-27342-Timing-Side-Channel-Attack-Vulnerability-Writeup.html
- shortcut icon/assets/favicon.ico
- stylesheet/assets/css/main.css
Links
27- https://blog.vastart.dev
- https://blog.vastart.dev/2021/02/27/python2-to-python3-hex-2fstr-2fbyte-conversion-cheatsheet
- https://blog.vastart.dev/2023/02/22/size-matters-solidity-integer-range-cheatsheet-from-uint8-to-uint256
- https://blog.vastart.dev/about
- https://blog.vastart.dev/assets/img/posts\sleep_called_on_bad_auth_only.jpg