5
CVSSv2

CVE-2018-10822

Published: 17/10/2018 Updated: 08/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in the web interface on D-Link DWR-116 up to and including 1.06, DIR-140L up to and including 1.02, DIR-640L up to and including 1.02, DWR-512 up to and including 2.02, DWR-712 up to and including 2.02, DWR-912 up to and including 2.02, DWR-921 up to and including 2.02, and DWR-111 up to and including 1.01 devices allows remote malicious users to read arbitrary files via a /.. or // after "GET /uir" in an HTTP request. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-6190.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dwr-116_firmware

dlink dir-140l_firmware

dlink dir-640l_firmware

dlink dwr-512_firmware

dlink dwr-712_firmware

dlink dwr-912_firmware

dlink dwr-921_firmware

dlink dwr-111_firmware

Exploits

Multiple D-Link router models suffer from code execution, plain-text password storage, and directory traversal vulnerabilities ...

Recent Articles

Last year, D-Link flubbed a router bug-fix, so it's back with total pwnage
The Register • Richard Chirgwin • 17 Oct 2018

Plain text password storage? Check. Directory traversal? Check. SOHOpeless? Check

Eight D-Link router variants are vulnerable to complete pwnage via a combination of security screwups, and only two are going to get patched. Błażej Adamczyk of the Silesian University of Technology in Poland posted this month to Full Disclosure that he discovered the bugs in May of this year and notified D-Link. Despite insisting patches would be released four months ago from now, D-Link hasn't addressed the issue, so Adamczyk has gone public with the security holes. For some of the affected ...