Vulnerability Description
The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Central Wifimanager | 1.03 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/150243/D-LINK-Central-WifiManager-CWM-100-1ExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2018/Nov/28ExploitMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/150243/D-LINK-Central-WifiManager-CWM-100-1ExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2018/Nov/28ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2018-15517?
CVE-2018-15517 is a vulnerability with a CVSS score of 8.6 (HIGH). The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, lea...
How severe is CVE-2018-15517?
CVE-2018-15517 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-15517?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Central Wifimanager.