CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
83.7%
On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-512 (B1) before firmware version 2.02b01, DWR-711 (A1) through firmware version 1.11, DWR-712 (B1) before firmware version 2.04b01, DWR-921 (A1) before firmware version 1.02b01, and DWR-921 (B1) before firmware version 2.03b01, there exists an EXCU_SHELL file in the web directory. By sending a GET request with specially crafted headers to the /EXCU_SHELL URI, an attacker could execute arbitrary shell commands in the root context on the affected device. Other devices might be affected as well.
Vendor | Product | Version | CPE |
---|---|---|---|
d-link | dap-1530_firmware | * | cpe:2.3:o:d-link:dap-1530_firmware:*:*:*:*:*:*:*:* |
dlink | dap-1530 | - | cpe:2.3:h:dlink:dap-1530:-:*:*:*:*:*:*:* |
d-link | dap-1610_firmware | * | cpe:2.3:o:d-link:dap-1610_firmware:*:*:*:*:*:*:*:* |
dlink | dap-1610 | - | cpe:2.3:h:dlink:dap-1610:-:*:*:*:*:*:*:* |
dlink | dwr-111_firmware | * | cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:* |
dlink | dwr-111 | - | cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:* |
d-link | dwr-116_firmware | 1.06 | cpe:2.3:o:d-link:dwr-116_firmware:1.06:b1:*:*:*:*:*:* |
d-link | dwr-116_firmware | 1.06 | cpe:2.3:o:d-link:dwr-116_firmware:1.06:b2:*:*:*:*:*:* |
dlink | dwr-116_firmware | * | cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:* |
dlink | dwr-116 | - | cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:* |
community.greenbone.net/t/cve-2018-19300-remote-command-execution-vulnerability-in-d-link-dwr-and-dap-routers/1772
eu.dlink.com/de/de/support/support-news/2019/march/19/remote-command-execution-vulnerability-in-d-link-dwr-and-dap-routers
www.greenbone.net/en/serious-vulnerability-discovered-in-d-link-routers/
www.greenbone.net/schwerwiegende-sicherheitsluecke-in-d-link-routern-entdeckt/
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
83.7%