""ET WEB_SERVER Possible D-Link Router HNAP Protocol Security Bypass Attempt""
SID: 2010698
Revision: 4
Class Type: web-application-attack
Metadata: created_at 2010_07_30, updated_at 2010_09_08
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "POST"
-
Value: "/HNAP1/"
-
Value: "SOAPAction|3A|"
-
Value: "DeviceSettings"
Within:
PCRE: "/SoapAction\x3A.+\x2FHNAP1\x2F(set|get)DeviceSettings/si"
Special Options:
-
nocase
-
http_method
-
nocase
-
http_uri
-
nocase
-
http_header
-
http_header
-
nocase