ID

VAR-E-201704-0089


CVE

cve_id:CVE-2018-10822

Trust: 2.1

cve_id:CVE-2017-6190

Trust: 1.3

cve_id:CVE-2018-10823

Trust: 0.5

cve_id:CVE-2018-10824

Trust: 0.5

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45678 // EDBNET: 99967

EDB ID

45678


TITLE

D-Link Routers - Directory Traversal - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 45678

DESCRIPTION

D-Link Routers - Directory Traversal. CVE-2018-10822 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 45678

AFFECTED PRODUCTS

vendor:d linkmodel:routersscope: - version: -

Trust: 1.6

vendor:d linkmodel:dwr-116scope: - version: -

Trust: 0.5

vendor:d linkmodel:plain-text password storagescope: - version: -

Trust: 0.5

vendor:d linkmodel:dwr-116 1.05scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.01scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.00 b10scope: - version: -

Trust: 0.3

vendor:d linkmodel:dwr-116 1.05b09scope:neversion: -

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45678 // EDBNET: 99967

EXPLOIT

Directory Traversal
CVE: CVE-2018-10822

CVSS v3: 8.6
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Description: Directory traversal vulnerability in the web interface on D-Link routers:

DWR-116 through 1.06,
DIR-140L through 1.02,
DIR-640L through 1.02,
DWR-512 through 2.02,
DWR-712 through 2.02,
DWR-912 through 2.02,
DWR-921 through 2.02,
DWR-111 through 1.01,
and probably others with the same type of firmware
allows remote attackers to read arbitrary files via a /.. or // after “GET /uir” in an HTTP request.

NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-6190.

PoC:

`$ curl http://routerip/uir//etc/passwd`
The vulnerability can be used retrieve administrative password using the other disclosed vulnerability - CVE-2018-10824.

This vulnerability was reported previously by Patryk Bogdan in CVE-2017-6190 but he reported it is fixed in certain release but unfortunately it is still present in even newer releases. The vulnerability is also present in other D-Link routers and can be exploited not only (as the original author stated) by double dot but also absolutely using double slash.

Trust: 1.0

sources: EXPLOIT-DB: 45678

EXPLOIT LANGUAGE

md

Trust: 0.6

sources: EXPLOIT-DB: 45678

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 45678

TYPE

Directory Traversal

Trust: 1.6

sources: EXPLOIT-DB: 45678 // EDBNET: 99967

TAGS

tag:exploit

Trust: 1.0

tag:file inclusion

Trust: 1.0

tag:arbitrary

Trust: 0.5

tag:vulnerability

Trust: 0.5

tag:code execution

Trust: 0.5

sources: PACKETSTORM: 142052 // PACKETSTORM: 149844

CREDITS

Blazej Adamczyk

Trust: 0.6

sources: EXPLOIT-DB: 45678

EXTERNAL IDS

db:NVDid:CVE-2018-10822

Trust: 2.1

db:EXPLOIT-DBid:45678

Trust: 1.6

db:NVDid:CVE-2017-6190

Trust: 1.3

db:EDBNETid:99967

Trust: 0.6

db:PACKETSTORMid:142052

Trust: 0.5

db:NVDid:CVE-2018-10824

Trust: 0.5

db:NVDid:CVE-2018-10823

Trust: 0.5

db:PACKETSTORMid:149844

Trust: 0.5

db:BIDid:97620

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45678 // EDBNET: 99967

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-10822

Trust: 2.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6190

Trust: 1.0

url:http://sploit.tech/2018/10/12/d-link.html

Trust: 1.0

url:https://www.exploit-db.com/exploits/45678/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-10824

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-10823

Trust: 0.5

url:http://seclists.org/bugtraq/2017/apr/28

Trust: 0.3

url:http://www.d-link.com

Trust: 0.3

sources: BID: 97620 // PACKETSTORM: 142052 // PACKETSTORM: 149844 // EXPLOIT-DB: 45678 // EDBNET: 99967

SOURCES

db:BIDid:97620
db:PACKETSTORMid:142052
db:PACKETSTORMid:149844
db:EXPLOIT-DBid:45678
db:EDBNETid:99967

LAST UPDATE DATE

2022-07-27T09:11:31.228000+00:00


SOURCES UPDATE DATE

db:BIDid:97620date:2017-04-18T00:06:00

SOURCES RELEASE DATE

db:BIDid:97620date:2017-04-07T00:00:00
db:PACKETSTORMid:142052date:2017-04-07T19:22:22
db:PACKETSTORMid:149844date:2018-10-18T03:47:09
db:EXPLOIT-DBid:45678date:2018-10-12T00:00:00
db:EDBNETid:99967date:2018-11-04T00:00:00