Lucene search

K
prionPRIOn knowledge basePRION:CVE-2018-19989
HistoryMay 13, 2019 - 2:29 p.m.

Design/Logic Flaw

2019-05-1314:29:00
PRIOn knowledge base
www.prio-n.com
2

9.4 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

86.9%

In the /HNAP1/SetQoSSettings message, the uplink parameter is vulnerable, and the vulnerability affects D-Link DIR-822 Rev.B 202KRb06 and DIR-822 Rev.C 3.10B06 devices. In the SetQoSSettings.php source code, the uplink parameter is saved in the /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth internal configuration memory without any regex checking. And in the bwc_tc_spq_start, bwc_tc_wfq_start, and bwc_tc_adb_start functions of the bwcsvcs.php source code, the data in /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth is used with the tc command without any regex checking. A vulnerable /HNAP1/SetQoSSettings XML message could have shell metacharacters in the uplink element such as the telnetd string.

9.4 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

86.9%

Related for PRION:CVE-2018-19989