D-Link DIR-818LW <= 2.06b01 Multiple Vulnerabilities

Published: 2019-07-31 12:01:18
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
Remote Banner

Solution Type:
None Available

Summary:
D-Link DIR-818LW devices are prone to multiple vulnerabilities.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Following vulnerabilities exist: - There is a command injection in HNAP1 (exploitable with authentication) via shell metacharacters in the MTU field to SetWanSettings. - There is a command injection in HNAP1 (exploitable with authentication) via shell metacharacters in the Type field to SetWantSettings.

Impact:
Successful exploitation would allow an authenticated attacker to gain complete control over the target device.

Affected Versions:
D-Link DIR-818LW through firmware version 2.06b01.

Recommendations:
No known solution is available as of 31st July, 2019. Information regarding this issue will be updated once solution details are available.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-13481
https://nvd.nist.gov/vuln/detail/CVE-2019-13482

CVE Analysis

https://www.mageni.net/cve/CVE-2019-13481
https://www.mageni.net/cve/CVE-2019-13482

SecurityFocus Bugtraq ID:

https://www.securityfocus.com/bid/109131

References:

https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-3.pdf
https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-4.pdf

Severity
High
CVSS Score
10.0
Published
2019-07-31
Modified
2019-08-01
Category
Web application abuses

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.