CVE-2018-10823 Scanner

CVE-2018-10823 scanner - OS Command Injection vulnerability in D-Link DWR-116, DWR-512, DWR-712, DWR-912, DWR-921 and DWR-111

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month 2 days

Scan only one

URL

Toolbox

-

The D-Link DWR-116, DWR-512, DWR-712, DWR-912, DWR-921 and DWR-111 are wireless routers that enable users to connect to the internet wirelessly. These devices are commonly used in homes, small businesses, and remote locations where the internet connection is only available through wireless signals. The routers provide stable and reliable connections with high-speed data transfer rates. They are also equipped with advanced security features that enable users to access the internet with confidence.

Recently, a critical vulnerability was discovered in these devices, identified as CVE-2018-10823. The vulnerability allows authenticated attackers to execute arbitrary code by injecting shell commands into the chkisg.htm page SIP parameter. This grants full control to the attacker and enables them to access and manipulate the device's internals, including the operating system and the applications it runs.

Exploitation of this vulnerability can lead to various adverse consequences. Attackers can carry out a range of malicious activities, such as intercepting and tampering with network traffic, stealing sensitive information, and launching further attacks on connected devices. They can also modify device settings, install malware, and take control of the network remotely without the user's knowledge.

Thanks to the pro features of the s4e.io platform, readers of this article can access comprehensive information about vulnerabilities in their digital assets quickly and easily. The platform provides real-time alerts, accurate vulnerability assessments, and customized recommendations to enhance digital security. Users can also scan and test their systems for vulnerabilities and receive detailed reports on their security posture. By taking advantage of these tools, users can stay one step ahead of cyber threats and safeguard their systems from exploitable vulnerabilities.

 

REFERENCES

Get started to protecting your Free Full Security Scan