First published: Tue Dec 11 2018(Updated: )
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. goform/formSysCmd allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-619l Firmware | =2.06b1 | |
Dlink Dir-619l | ||
D-link Dir-605l Firmware | =2.12b1 | |
Dlink Dir-605l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-20057 is critical with a severity value of 8.8.
The vulnerability in D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices is in /bin/boa, specifically in goform/formSysCmd, which allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter.
D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices are affected by CVE-2018-20057.
A remote authenticated user can exploit CVE-2018-20057 by using the sysCmd POST parameter in goform/formSysCmd to execute arbitrary OS commands.
The fix for CVE-2018-20057 is not mentioned in the provided information. Please refer to the reference link for more information.