Description
An issue was discovered on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. The administrative password is stored in plaintext in the /tmp/csman/0 file. An attacker having a directory traversal (or LFI) can easily get full router access.
Published: 2018-10-17
Score: 9.8 Critical
EPSS: 42.9% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Dlink Dir-140l Dir-140l Firmware Dir-640l Dir-640l Firmware Dwr-111 Dwr-111 Firmware Dwr-116 Dwr-116 Firmware Dwr-512 Dwr-512 Firmware Dwr-712 Dwr-712 Firmware Dwr-912 Firmware Dwr-921 Dwr-921 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T07:46:46.962Z

Reserved: 2018-05-08T00:00:00.000Z

Link: CVE-2018-10824

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-10-17T14:29:00.930

Modified: 2024-11-21T03:42:05.830

Link: CVE-2018-10824

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses