First published: Wed Oct 17 2018(Updated: )
An issue was discovered on D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DWR-116 Firmware | <=1.06 | |
D-Link DWR-116 | ||
D-Link DWR-512 Firmware | <=2.02 | |
D-Link DWR-512 | ||
dlink DWR-912 firmware | <=2.02 | |
dlink dwr-921 | ||
dlink DWR-111 firmware | <=1.01 | |
dlink DWR-111 firmware | ||
D-Link DWR-921 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10823 has a high severity level due to its potential for remote code execution.
To fix CVE-2018-10823, update the firmware of your D-Link devices to the latest version available.
CVE-2018-10823 affects D-Link DWR-116, DWR-512, DWR-712, DWR-912, DWR-921, and DWR-111 models running specific firmware versions.
No, CVE-2018-10823 requires authentication for an attacker to execute arbitrary code.
CVE-2018-10823 is considered a remote attack since it can be executed over the network once the attacker is authenticated.