First published: Sat Jul 06 2019(Updated: )
/web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Central Wifimanager | <=1.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13372 is a vulnerability in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 that allows remote attackers to execute arbitrary PHP code via a cookie.
The severity of CVE-2019-13372 is critical with a severity value of 9.8.
CVE-2019-13372 affects D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6.
Remote attackers can exploit CVE-2019-13372 by injecting arbitrary PHP code via a cookie's username field and bypassing authentication with an empty password.
Yes, here are some references for CVE-2019-13372: - http://packetstormsecurity.com/files/158904/D-Link-Central-WiFi-Manager-CWM-100-Remote-Code-Execution.html - https://github.com/unh3x/unh3x.github.io/blob/master/_posts/2019-02-21-D-link-(CWM-100)-Multiple-Vulnerabilities.md - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10117