Server-Side Request Forgery in D-Link Central WiFiManager
CVE-2018-15517
8.6HIGH
Summary
The MailConnect feature in D-Link Central WiFiManager CWM-100 version 1.03 r0098 is designed to facilitate the connection to an SMTP server. However, the implementation is flawed, enabling outbound TCP connections to any IP address and any port. This vulnerability can be exploited to perform server-side request forgery (SSRF), potentially allowing unauthorized access to internal services by using crafted requests. An example of the exploit involves leveraging the index.php/System/MailConnect endpoint, demonstrating its ability to route traffic to an internal server at 127.0.0.1 on port 22.
References
EPSS Score
69% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.6
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved