Remote code execution in D-Link products - #VU10024
Published: January 16, 2018
Vulnerability identifier: #VU10024
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: D-Link
Affected software:
DIR-815
DIR-645
DIR-615
DIR-815
DIR-645
DIR-615
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to a flaw in the service.cgi when handling malicious input. A remote attacker can send a specially crafted request and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to a flaw in the service.cgi when handling malicious input. A remote attacker can send a specially crafted request and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.