### [CVE-2019-13375](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13375) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description A SQL Injection was discovered in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 in PayAction.class.php with the index.php/Pay/passcodeAuth parameter passcode. The vulnerability does not need any authentication. ### POC #### Reference - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md - https://unh3x.github.io/2019/02/21/D-link-(CWM-100)-Multiple-Vulnerabilities/ #### Github No PoCs found on GitHub currently.