Description
In the /HNAP1/SetRouterSettings message, the RemotePort parameter is vulnerable, and the vulnerability affects D-Link DIR-818LW Rev.A 2.05.B03 and DIR-822 B1 202KRb06 devices. In the SetRouterSettings.php source code, the RemotePort parameter is saved in the $path_inf_wan1."/web" internal configuration memory without any regex checking. And in the IPTWAN_build_command function of the iptwan.php source code, the data in $path_inf_wan1."/web" is used with the iptables command without any regex checking. A vulnerable /HNAP1/SetRouterSettings XML message could have shell metacharacters in the RemotePort element such as the `telnetd` string.
Published: 2019-05-13
Score: 9.8 Critical
EPSS: 54.9% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

D-link Dir-818lw Firmware Dir-822 Firmware
Dlink Dir-818lw Dir-822
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:51:17.925Z

Reserved: 2018-12-09T00:00:00.000Z

Link: CVE-2018-19986

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-13T14:29:01.143

Modified: 2024-11-21T03:58:56.683

Link: CVE-2018-19986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses