Server-Side Request Forgery in D-Link Central WiFiManager
CVE-2018-15517

8.6HIGH

Key Information:

Vendor
D-Link
Vendor
CVE Published:
31 January 2019

Summary

The MailConnect feature in D-Link Central WiFiManager CWM-100 version 1.03 r0098 is designed to facilitate the connection to an SMTP server. However, the implementation is flawed, enabling outbound TCP connections to any IP address and any port. This vulnerability can be exploited to perform server-side request forgery (SSRF), potentially allowing unauthorized access to internal services by using crafted requests. An example of the exploit involves leveraging the index.php/System/MailConnect endpoint, demonstrating its ability to route traffic to an internal server at 127.0.0.1 on port 22.

References

EPSS Score

69% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.