Remote Port Parameter Vulnerability in D-Link Routers
CVE-2018-19986
9.8CRITICAL
Summary
The vulnerability in D-Link DIR-818LW and DIR-822 routers arises from the improper handling of the RemotePort parameter in the /HNAP1/SetRouterSettings message. Without adequate regex validation, crafted XML messages can potentially allow attackers to inject shell metacharacters into the system configuration. This loophole can lead to significant security concerns, as it enables raw command execution through the device, putting users' networks at risk.
References
EPSS Score
9% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved