CVE-2018-10967

On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can forge an HTTP request to inject operating system commands that can be executed on the device with higher privileges, aka remote code execution.
References
Link Resource
https://fortiguard.com/zeroday/FG-VD-18-060 Third Party Advisory
https://fortiguard.com/zeroday/FG-VD-18-060 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:d-link:dir-550a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-550a:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:d-link:dir-604m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-604m:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () https://fortiguard.com/zeroday/FG-VD-18-060 - Third Party Advisory () https://fortiguard.com/zeroday/FG-VD-18-060 - Third Party Advisory

Information

Published : 2018-05-18 14:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10967

Mitre link : CVE-2018-10967

CVE.ORG link : CVE-2018-10967


JSON object : View

Products Affected

dlink

  • dir-604m
  • dir-550a

d-link

  • dir-550a_firmware
  • dir-604m_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')