On D-Link DIR-818LW Rev.A 2.05.B03 and DIR-860L Rev.B 2.03.B03 devices, unauthenticated remote OS command execution can occur in the soap.cgi service of the cgibin binary via an "&&" substring in the service parameter. NOTE: this issue exists because of an incomplete fix for CVE-2018-6530.
References
Link | Resource |
---|---|
https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114 | Exploit |
https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114 | Exploit |
Configurations
History
21 Nov 2024, 04:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114 - Exploit |
Information
Published : 2019-01-02 18:29
Updated : 2024-11-21 04:00
NVD link : CVE-2018-20114
Mitre link : CVE-2018-20114
CVE.ORG link : CVE-2018-20114
JSON object : View
Products Affected
dlink
- dir-860l
- dir-860l_firmware
- dir-818lw
- dir-818lw_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')