Directory traversal vulnerability in the web interface on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices allows remote attackers to read arbitrary files via a /.. or // after "GET /uir" in an HTTP request. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-6190.
References
Link | Resource |
---|---|
http://sploit.tech/2018/10/12/D-Link.html | Exploit |
https://seclists.org/fulldisclosure/2018/Oct/36 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2018-10-17 14:29
Updated : 2023-11-08 22:46
NVD link : CVE-2018-10822
Mitre link : CVE-2018-10822
CVE.ORG link : CVE-2018-10822
JSON object : View
Products Affected
dlink
- dwr-921
- dwr-116_firmware
- dwr-512_firmware
- dwr-111_firmware
- dir-640l_firmware
- dir-140l_firmware
- dir-140l
- dwr-712
- dwr-116
- dwr-912_firmware
- dwr-712_firmware
- dwr-111
- dwr-512
- dwr-921_firmware
- dir-640l
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')