ID:5989 - Exploit for Unrestricted upload of file with dangerous type in D-Link Central WiFi Manager - CVE-2018-17442

 
Main Vulnerability Database Exploits ID:5989 - Exploit for Unrestricted upload of file with dangerous type in D-Link Central WiFi Manager - CVE-2018-17442

ID:5989 - Exploit for Unrestricted upload of file with dangerous type in D-Link Central WiFi Manager - CVE-2018-17442

Published: June 17, 2021


Vulnerability identifier: #VU15171
Vulnerability risk: High
CVE-ID: CVE-2018-17442
CWE-ID: CWE-434
Exploitation vector: Remote access
Vulnerable software:
D-Link Central WiFi Manager

Link to public exploit:


Vulnerability description

The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.

The weakness exists due to unrestricted file upload of file with dangerous type when the .rar is uploaded is stored in the path '\web\captivalportal' in a folder with a timestamp created by the PHP time() function. A remote attacker can upload RAR archives, abuse the functionality to upload archives that include a PHP file  and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 1.03R0100-Beta1.