CWE
22 522
Advisory Published
Updated

CVE-2018-10824: Path Traversal

First published: Wed Oct 17 2018(Updated: )

An issue was discovered on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. The administrative password is stored in plaintext in the /tmp/csman/0 file. An attacker having a directory traversal (or LFI) can easily get full router access.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Dlink Dwr-116 Firmware<=1.06
Dlink Dwr-116
Dlink Dir-140l Firmware<=1.02
Dlink Dir-140l
Dlink Dir-640l Firmware<=1.02
Dlink Dir-640l
Dlink Dwr-512 Firmware<=2.02
Dlink Dwr-512
Dlink Dwr-712 Firmware<=2.02
Dlink Dwr-712
Dlink Dwr-912 Firmware<=2.02
D-link Dwr-921
Dlink Dwr-921 Firmware<=2.02
Dlink Dwr-921
Dlink Dwr-111 Firmware<=1.01
Dlink Dwr-111

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203