10

CVE-2018-19987

Exploit

D-Link DIR-822 Rev.B 202KRb06, DIR-822 Rev.C 3.10B06, DIR-860L Rev.B 2.03.B03, DIR-868L Rev.B 2.05B02, DIR-880L Rev.A 1.20B01_01_i3se_BETA, and DIR-890L Rev.A 1.21B02_BETA devices mishandle IsAccessPoint in /HNAP1/SetAccessPointMode. In the SetAccessPointMode.php source code, the IsAccessPoint parameter is saved in the ShellPath script file without any regex checking. After the script file is executed, the command injection occurs. A vulnerable /HNAP1/SetAccessPointMode XML message could have shell metacharacters in the IsAccessPoint element such as the `telnetd` string.

Data is provided by the National Vulnerability Database (NVD)
D-linkDir-818lw Firmware Version2.05.b03
   DlinkDir-818lw Version-
D-linkDir-822 Firmware Version202krb06
   DlinkDir-822 Version-
DlinkDir-822 Firmware Version3.10b06
   DlinkDir-822 Version-
D-linkDir-860l Firmware Version2.03.b03
   DlinkDir-860l Version-
D-linkDir-868l Firmware Version2.05b02
   DlinkDir-868l Version-
D-linkDir-880l Firmware Version1.20b01_01_i3se Updatebeta
   DlinkDir-880l Version-
D-linkDir-890l/r Firmware Version1.21b02 Updatebeta
   DlinkDir-890l/r Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 81.83% 0.991
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.