#VU10024 Remote code execution


Published: 2018-01-16

Vulnerability identifier: #VU10024

Vulnerability risk: High

CVSSv3.1: 9.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: N/A

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Dir-815
Hardware solutions / Routers & switches, VoIP, GSM, etc
Dir-645
Hardware solutions / Routers & switches, VoIP, GSM, etc
Dir-615
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: D-Link

Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to a flaw in the service.cgi when handling malicious input. A remote attacker can send a specially crafted request and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.

Vulnerable software versions

Dir-815: 1.03

Dir-645: 1.03

Dir-615: 1.03


External links
http://exchange.xforce.ibmcloud.com/vulnerabilities/137517


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability