CVE-2018-19300

EUVD-2018-11000
On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-512 (B1) before firmware version 2.02b01, DWR-711 (A1) through firmware version 1.11, DWR-712 (B1) before firmware version 2.04b01, DWR-921 (A1) before firmware version 1.02b01, and DWR-921 (B1) before firmware version 2.03b01, there exists an EXCU_SHELL file in the web directory. By sending a GET request with specially crafted headers to the /EXCU_SHELL URI, an attacker could execute arbitrary shell commands in the root context on the affected device. Other devices might be affected as well.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
Affected Products (NVD)
VendorProductVersion
d-linkdap-1530_firmware
𝑥
≤ 1.05
d-linkdap-1610_firmware
𝑥
≤ 1.05
dlinkdwr-111_firmware
𝑥
≤ 1.01
d-linkdwr-116_firmware
1.06:b1
d-linkdwr-116_firmware
1.06:b2
dlinkdwr-116_firmware
𝑥
≤ 1.05
dlinkdwr-512_firmware
𝑥
≤ 2.02
d-linkdwr-711_firmware
𝑥
≤ 1.11
dlinkdwr-712_firmware
𝑥
≤ 2.02
dlinkdwr-921_firmware
𝑥
≤ 1.02
dlinkdwr-921_firmware
𝑥
≤ 2.02
𝑥
= Vulnerable software versions