10
CVSSv2

CVE-2018-6530

Published: 06/03/2018 Updated: 08/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote malicious users to execute arbitrary OS commands via the service parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dir-860l_firmware

dlink dir-865l_firmware

dlink dir-868l_firmware

dlink dir-880l_firmware

Github Repositories

日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。

0x00 Product Description Dlink is a multinational networking equipment manufacturing corporation The Dlink 860L/865L/868L/880L are wireless "Cloud" Router The vulnerabilities details are as follows: Vendor: D-Link Devices: DIR-880 REVA / DIR-868 REVA / DIR-865 / DIR-860 REVA Firmware: DIR-880L_REVA_FIRMWARE_PATCH_108B04 DIR868LA1_FW112b04 DIR-865L_REVA_FIRMWARE_PAT

dir-815 Exploit Author: yangchunyu@whueducn Vendor: D-Link Firmware: dir815_v101SSb08bin I found unauthenticated remote code execution vulnerability in soapcgi_main function of cgibin binary On the /soapcgi HTTP POST message on 49152 port, with the service GET parameter, the unauthenticated remote attacker can execute the shell command The similar vulnerability already e