Three vulnerabilities have been disclosed in D-Link’s range of small office/home office wireless routers. An authenticated attacker could exploit these vulnerabilities to remotely execute arbitrary code on affected devices.
The three vulnerabilities are as follows:
- CVE-2018-10822 – A vulnerability in the web interface of D-Link routers allows for directory traversal. This vulnerability was believed to have been patched in 2017 (CVE-2017-6190).
- CVE-2018-10823 – Login credentials, stored as plaintext, can be easily retrieved by an authenticated user. A proof-of-concept exploit for this has already been observed in the wild.
- CVE-2018-10824 – Admin passwords are stored as plaintext in the temporary folder.
For further information see the following CVE’s:
D-Link wireless routers:
- DWR-111 – Firmware versions 1.01 and earlier
- DWR-116 – Firmware versions 1.06 and earlier
- DWR-512 – Firmware versions 2.02 and earlier
- DWR-712 – Firmware versions 2.02 and earlier
- DWR-912 – Firmware versions 2.02 and earlier
- DWR-921 – Firmware versions 2.02 and earlier
- DIR-140L – Firmware versions 1.02 and earlier
- DIR-640L – Firmware versions 1.02 and earlier
D-Link have announced that updates to address these vulnerabilities are being produced for the DWR-116 and DWR-111 models. Users should apply these patches as soon as they become available. D-Link have also stated that as the other vulnerable models are deprecated they will not be receiving updates. Users should consider their usage of these models