// For flags

CVE-2018-19986

 

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In the /HNAP1/SetRouterSettings message, the RemotePort parameter is vulnerable, and the vulnerability affects D-Link DIR-818LW Rev.A 2.05.B03 and DIR-822 B1 202KRb06 devices. In the SetRouterSettings.php source code, the RemotePort parameter is saved in the $path_inf_wan1."/web" internal configuration memory without any regex checking. And in the IPTWAN_build_command function of the iptwan.php source code, the data in $path_inf_wan1."/web" is used with the iptables command without any regex checking. A vulnerable /HNAP1/SetRouterSettings XML message could have shell metacharacters in the RemotePort element such as the `telnetd` string.

En el mensaje /HNAP1/SetRouterSettings, el parámetro RemotePort es vulnerable y la vulnerabilidad afecta a los dispositivos D-Link DIR-818LW Rev.A 2.05.B03 y DIR-822 B1 202KRb06. En el código fuente del archivo SetRouterSettings.php, el parámetro RemotePort es guardado en la memoria de la configuración interna de $path_inf_wan1."/web" sin ninguna comprobación regex. Y en la función IPTWAN_build_command del código fuente iptwan.php, los datos en $ path_inf_wan1. "/ Web" se usa con el comando iptables sin ninguna comprobación regex. Un mensaje XML vulnerable/HNAP1/SetRouterSettings podría tener metacaracteres shell en el elemento RemotePort como la cadena "telnetd".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-09 CVE Reserved
  • 2019-05-13 CVE Published
  • 2023-12-27 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
D-link
Search vendor "D-link"
Dir-818lw Firmware
Search vendor "D-link" for product "Dir-818lw Firmware"
2.05.b03
Search vendor "D-link" for product "Dir-818lw Firmware" and version "2.05.b03"
-
Affected
in Dlink
Search vendor "Dlink"
Dir-818lw
Search vendor "Dlink" for product "Dir-818lw"
--
Safe
D-link
Search vendor "D-link"
Dir-822 Firmware
Search vendor "D-link" for product "Dir-822 Firmware"
202krb06
Search vendor "D-link" for product "Dir-822 Firmware" and version "202krb06"
-
Affected
in Dlink
Search vendor "Dlink"
Dir-822
Search vendor "Dlink" for product "Dir-822"
--
Safe