On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-512 (B1) before firmware version 2.02b01, DWR-711 (A1) through firmware version 1.11, DWR-712 (B1) before firmware version 2.04b01, DWR-921 (A1) before firmware version 1.02b01, and DWR-921 (B1) before firmware version 2.03b01, there exists an EXCU_SHELL file in the web directory. By sending a GET request with specially crafted headers to the /EXCU_SHELL URI, an attacker could execute arbitrary shell commands in the root context on the affected device. Other devices might be affected as well.

Project Subscriptions

Vendors Products
Dap-1530 Firmware Subscribe
Dap-1610 Firmware Subscribe
Dwr-116 Firmware Subscribe
Dwr-711 Firmware Subscribe
Dap-1530 Subscribe
Dap-1610 Subscribe
Dwr-111 Subscribe
Dwr-111 Firmware Subscribe
Dwr-116 Subscribe
Dwr-116 Firmware Subscribe
Dwr-512 Subscribe
Dwr-512 Firmware Subscribe
Dwr-711 Subscribe
Dwr-712 Subscribe
Dwr-712 Firmware Subscribe
Dwr-921 Subscribe
Dwr-921 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:30:04.205Z

Reserved: 2018-11-15T00:00:00

Link: CVE-2018-19300

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-11T16:29:00.620

Modified: 2024-11-21T03:57:42.013

Link: CVE-2018-19300

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses