D-Link Router RCE Vulnerabilities

Three vulnerabilities have been disclosed in D-Link’s range of small office/home office wireless routers. An authenticated attacker could exploit these vulnerabilities to remotely execute arbitrary code on affected devices.

The three vulnerabilities are as follows:

  • CVE-2018-10822 – A vulnerability in the web interface of D-Link routers allows for directory traversal. This vulnerability was believed to have been patched in 2017 (CVE-2017-6190).
  • CVE-2018-10823 – Login credentials, stored as plaintext, can be easily retrieved by an authenticated user. A proof-of-concept exploit for this has already been observed in the wild.
  • CVE-2018-10824 – Admin passwords are stored as plaintext in the temporary folder.

For further information see the following CVE’s:

Affected Platforms

D-Link wireless routers:

  • DWR-111 – Firmware versions 1.01 and earlier
  • DWR-116 – Firmware versions 1.06 and earlier
  • DWR-512 – Firmware versions 2.02 and earlier
  • DWR-712 – Firmware versions 2.02 and earlier
  • DWR-912 – Firmware versions 2.02 and earlier
  • DWR-921 – Firmware versions 2.02 and earlier
  • DIR-140L – Firmware versions 1.02 and earlier
  • DIR-640L – Firmware versions 1.02 and earlier

Resolution

D-Link have announced that updates to address these vulnerabilities are being produced for the DWR-116 and DWR-111 models. Users should apply these patches as soon as they become available. D-Link have also stated that as the other vulnerable models are deprecated they will not be receiving updates. Users should consider their usage of these models



Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: