9.8
CVSSv3

CVE-2018-20114

Published: 02/01/2019 Updated: 23/04/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

On D-Link DIR-818LW Rev.A 2.05.B03 and DIR-860L Rev.B 2.03.B03 devices, unauthenticated remote OS command execution can occur in the soap.cgi service of the cgibin binary via an "&&" substring in the service parameter. NOTE: this issue exists because of an incomplete fix for CVE-2018-6530.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dir-818lw_firmware 2.05.b03

dlink dir-860l_firmware 2.03.b03

Github Repositories

dir-815 Exploit Author: yangchunyu@whueducn Vendor: D-Link Firmware: dir815_v101SSb08bin I found unauthenticated remote code execution vulnerability in soapcgi_main function of cgibin binary On the /soapcgi HTTP POST message on 49152 port, with the service GET parameter, the unauthenticated remote attacker can execute the shell command The similar vulnerability already e