ID

VAR-201905-1160


CVE

CVE-2018-19989


TITLE

D-Link DIR-822 Command injection vulnerability in devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-015431

DESCRIPTION

In the /HNAP1/SetQoSSettings message, the uplink parameter is vulnerable, and the vulnerability affects D-Link DIR-822 Rev.B 202KRb06 and DIR-822 Rev.C 3.10B06 devices. In the SetQoSSettings.php source code, the uplink parameter is saved in the /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth internal configuration memory without any regex checking. And in the bwc_tc_spq_start, bwc_tc_wfq_start, and bwc_tc_adb_start functions of the bwcsvcs.php source code, the data in /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth is used with the tc command without any regex checking. A vulnerable /HNAP1/SetQoSSettings XML message could have shell metacharacters in the uplink element such as the `telnetd` string. D-Link DIR-822 The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-822 is a wireless router produced by Taiwan D-Link Company. The vulnerability stems from the fact that the network system or product does not correctly filter special characters, commands, etc. in the process of constructing executable commands of the operating system from external input data. Attackers can exploit this vulnerability to execute illegal operating system commands

Trust: 1.8

sources: NVD: CVE-2018-19989 // JVNDB: JVNDB-2018-015431 // VULHUB: VHN-130703 // VULMON: CVE-2018-19989

AFFECTED PRODUCTS

vendor:d linkmodel:dir-822scope:eqversion:202krb06

Trust: 1.8

vendor:dlinkmodel:dir-822scope:eqversion:3.10b06

Trust: 1.0

vendor:d linkmodel:dir-822scope:eqversion:3.10b06

Trust: 0.8

sources: JVNDB: JVNDB-2018-015431 // NVD: CVE-2018-19989

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-19989
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-19989
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201905-308
value: CRITICAL

Trust: 0.6

VULHUB: VHN-130703
value: HIGH

Trust: 0.1

VULMON: CVE-2018-19989
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-19989
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-130703
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-19989
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-130703 // VULMON: CVE-2018-19989 // JVNDB: JVNDB-2018-015431 // CNNVD: CNNVD-201905-308 // NVD: CVE-2018-19989

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-130703 // JVNDB: JVNDB-2018-015431 // NVD: CVE-2018-19989

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-308

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201905-308

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015431

PATCH

title:DIR-822url:http://www.mydlink.co.kr/2013/beta_board/product_detail.php?no=205&model=DIR-822

Trust: 0.8

title:FirmAEurl:https://github.com/pr0v3rbs/FirmAE

Trust: 0.1

title: - url:https://github.com/sinword/FirmAE_Connlab

Trust: 0.1

sources: VULMON: CVE-2018-19989 // JVNDB: JVNDB-2018-015431

EXTERNAL IDS

db:NVDid:CVE-2018-19989

Trust: 2.6

db:JVNDBid:JVNDB-2018-015431

Trust: 0.8

db:CNNVDid:CNNVD-201905-308

Trust: 0.7

db:VULHUBid:VHN-130703

Trust: 0.1

db:VULMONid:CVE-2018-19989

Trust: 0.1

sources: VULHUB: VHN-130703 // VULMON: CVE-2018-19989 // JVNDB: JVNDB-2018-015431 // CNNVD: CNNVD-201905-308 // NVD: CVE-2018-19989

REFERENCES

url:https://github.com/pr0v3rbs/cve/tree/master/cve-2018-19986%20-%2019990

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-19989

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19989

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/pr0v3rbs/firmae

Trust: 0.1

sources: VULHUB: VHN-130703 // VULMON: CVE-2018-19989 // JVNDB: JVNDB-2018-015431 // CNNVD: CNNVD-201905-308 // NVD: CVE-2018-19989

SOURCES

db:VULHUBid:VHN-130703
db:VULMONid:CVE-2018-19989
db:JVNDBid:JVNDB-2018-015431
db:CNNVDid:CNNVD-201905-308
db:NVDid:CVE-2018-19989

LAST UPDATE DATE

2024-11-23T21:37:16.395000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-130703date:2019-10-03T00:00:00
db:VULMONid:CVE-2018-19989date:2023-04-26T00:00:00
db:JVNDBid:JVNDB-2018-015431date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201905-308date:2020-05-22T00:00:00
db:NVDid:CVE-2018-19989date:2024-11-21T03:58:57.110

SOURCES RELEASE DATE

db:VULHUBid:VHN-130703date:2019-05-13T00:00:00
db:VULMONid:CVE-2018-19989date:2019-05-13T00:00:00
db:JVNDBid:JVNDB-2018-015431date:2019-06-04T00:00:00
db:CNNVDid:CNNVD-201905-308date:2019-05-13T00:00:00
db:NVDid:CVE-2018-19989date:2019-05-13T14:29:01.330