An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. They expose an FTP server that serves by default on port 9000 and has hardcoded credentials (admin, admin). Taking advantage of this, a remote unauthenticated attacker could execute arbitrary PHP code by uploading any file in the web root directory and then accessing it via a request.
References
Link | Resource |
---|---|
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10092 | Patch Vendor Advisory |
http://seclists.org/fulldisclosure/2018/Oct/11 | Exploit Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/45533/ | Exploit Third Party Advisory VDB Entry |
https://www.secureauth.com/labs/advisories/d-link-central-wifimanager-software-controller-multiple-vulnerabilities | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-10-08 09:29
Updated : 2018-11-23 10:50
NVD link : CVE-2018-17440
Mitre link : CVE-2018-17440
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
d-link
- central_wifimanager