mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
22 lines
1.3 KiB
Markdown
22 lines
1.3 KiB
Markdown
![]() |
### [CVE-2018-19986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19986)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In the /HNAP1/SetRouterSettings message, the RemotePort parameter is vulnerable, and the vulnerability affects D-Link DIR-818LW Rev.A 2.05.B03 and DIR-822 B1 202KRb06 devices. In the SetRouterSettings.php source code, the RemotePort parameter is saved in the $path_inf_wan1."/web" internal configuration memory without any regex checking. And in the IPTWAN_build_command function of the iptwan.php source code, the data in $path_inf_wan1."/web" is used with the iptables command without any regex checking. A vulnerable /HNAP1/SetRouterSettings XML message could have shell metacharacters in the RemotePort element such as the `telnetd` string.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/SexyBeast233/SecBooks
|
||
|
- https://github.com/XinRoom/dir2md
|
||
|
- https://github.com/pr0v3rbs/FirmAE
|
||
|
- https://github.com/sinword/FirmAE_Connlab
|
||
|
|