First published: Thu Apr 11 2019(Updated: )
On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-512 (B1) before firmware version 2.02b01, DWR-711 (A1) through firmware version 1.11, DWR-712 (B1) before firmware version 2.04b01, DWR-921 (A1) before firmware version 1.02b01, and DWR-921 (B1) before firmware version 2.03b01, there exists an EXCU_SHELL file in the web directory. By sending a GET request with specially crafted headers to the /EXCU_SHELL URI, an attacker could execute arbitrary shell commands in the root context on the affected device. Other devices might be affected as well.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dap-1530 Firmware | <=1.05 | |
Dlink Dap-1530 | ||
D-link Dap-1610 Firmware | <=1.05 | |
Dlink Dap-1610 | ||
Dlink Dwr-111 Firmware | <=1.01 | |
Dlink Dwr-111 | ||
D-link Dwr-116 Firmware | =1.06-b1 | |
D-link Dwr-116 Firmware | =1.06-b2 | |
Dlink Dwr-116 Firmware | <=1.05 | |
Dlink Dwr-116 | ||
Dlink Dwr-512 Firmware | <=2.02 | |
Dlink Dwr-512 | ||
D-link Dwr-711 Firmware | <=1.11 | |
Dlink Dwr-711 | ||
Dlink Dwr-712 Firmware | <=2.02 | |
Dlink Dwr-712 | ||
Dlink Dwr-921 Firmware | <=1.02 | |
Dlink Dwr-921 | ||
Dlink Dwr-921 Firmware | <=2.02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.