Vulnerability Description
On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-512 (B1) before firmware version 2.02b01, DWR-711 (A1) through firmware version 1.11, DWR-712 (B1) before firmware version 2.04b01, DWR-921 (A1) before firmware version 1.02b01, and DWR-921 (B1) before firmware version 2.03b01, there exists an EXCU_SHELL file in the web directory. By sending a GET request with specially crafted headers to the /EXCU_SHELL URI, an attacker could execute arbitrary shell commands in the root context on the affected device. Other devices might be affected as well.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dap-1530 Firmware | <= 1.05 |
| Dlink | Dap-1530 | - |
| D-Link | Dap-1610 Firmware | <= 1.05 |
| Dlink | Dap-1610 | - |
| Dlink | Dwr-111 Firmware | <= 1.01 |
| Dlink | Dwr-111 | - |
| D-Link | Dwr-116 Firmware | 1.06 |
| Dlink | Dwr-116 Firmware | <= 1.05 |
| Dlink | Dwr-116 | - |
| Dlink | Dwr-512 Firmware | <= 2.02 |
| Dlink | Dwr-512 | - |
| D-Link | Dwr-711 Firmware | <= 1.11 |
| Dlink | Dwr-711 | - |
| Dlink | Dwr-712 Firmware | <= 2.02 |
| Dlink | Dwr-712 | - |
| Dlink | Dwr-921 Firmware | <= 1.02 |
| Dlink | Dwr-921 | - |
Related Weaknesses (CWE)
References
- https://community.greenbone.net/t/cve-2018-19300-remote-command-execution-vulnerExploitThird Party Advisory
- https://eu.dlink.com/de/de/support/support-news/2019/march/19/remote-command-exeVendor Advisory
- https://www.greenbone.net/en/serious-vulnerability-discovered-in-d-link-routers/Third Party Advisory
- https://www.greenbone.net/schwerwiegende-sicherheitsluecke-in-d-link-routern-entThird Party Advisory
- https://community.greenbone.net/t/cve-2018-19300-remote-command-execution-vulnerExploitThird Party Advisory
- https://eu.dlink.com/de/de/support/support-news/2019/march/19/remote-command-exeVendor Advisory
- https://www.greenbone.net/en/serious-vulnerability-discovered-in-d-link-routers/Third Party Advisory
- https://www.greenbone.net/schwerwiegende-sicherheitsluecke-in-d-link-routern-entThird Party Advisory
FAQ
What is CVE-2018-19300?
CVE-2018-19300 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-...
How severe is CVE-2018-19300?
CVE-2018-19300 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-19300?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dap-1530 Firmware, Dlink Dap-1530, D-Link Dap-1610 Firmware, Dlink Dap-1610, Dlink Dwr-111 Firmware.