Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2018-19300
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-512 (B1) before firmware version 2.02b01, DWR-711 (A1) through firmware version 1.11, DWR-712 (B1) before firmware version 2.04b01, DWR-921 (A1) before firmware version 1.02b01, and DWR-921 (B1) before firmware version 2.03b01, there exists an EXCU_SHELL file in the web directory. By sending a GET request with specially crafted headers to the /EXCU_SHELL URI, an attacker could execute arbitrary shell commands in the root context on the affected device. Other devices might be affected as well..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- Critical
- Base Score
- 9.8/10
- Exploit Score
- 3.9/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 5.9/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:d-link:dap-1530_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dap-1530:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:d-link:dap-1610_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dap-1610:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:dlink:dwr-111_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dwr-111:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:d-link:dwr-116_firmware:1.06:b1:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:d-link:dwr-116_firmware:1.06:b2:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:dlink:dwr-116_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dwr-116:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:dlink:dwr-512_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dwr-512:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:d-link:dwr-711_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dwr-711:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:dlink:dwr-712_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dwr-712:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:dlink:dwr-921_firmware:*:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:dlink:dwr-921:-:*:*:*:*:*:*:* |
No
|
- |
References
- https://www.greenbone.net/schwerwiegende-sicherheitsluecke-in-d-link-routern-entdeckt/
- https://eu.dlink.com/de/de/support/support-news/2019/march/19/remote-command-execution-v
- https://community.greenbone.net/t/cve-2018-19300-remote-command-execution-vulnerability-
- https://www.greenbone.net/en/serious-vulnerability-discovered-in-d-link-routers/