In the /HNAP1/SetRouterSettings message, the RemotePort parameter is vulnerable, and the vulnerability affects D-Link DIR-818LW Rev.A 2.05.B03 and DIR-822 B1 202KRb06 devices. In the SetRouterSettings.php source code, the RemotePort parameter is saved in the $path_inf_wan1."/web" internal configuration memory without any regex checking. And in the IPTWAN_build_command function of the iptwan.php source code, the data in $path_inf_wan1."/web" is used with the iptables command without any regex checking. A vulnerable /HNAP1/SetRouterSettings XML message could have shell metacharacters in the RemotePort element such as the `telnetd` string.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:51:17.925Z

Reserved: 2018-12-09T00:00:00

Link: CVE-2018-19986

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-13T14:29:01.143

Modified: 2024-11-21T03:58:56.683

Link: CVE-2018-19986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses