Directory traversal vulnerability in the web interface on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices allows remote attackers to read arbitrary files via a /.. or // after "GET /uir" in an HTTP request. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-6190.
Vector
NETWORK
Complexity
LOW
Authentication
NONE
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE
D-link Dir-140l firmware 1.02 (not an official CPE)
D-link Dir-640l firmware 1.02 (not an official CPE)
D-link Dwr-111 firmware 1.01 (not an official CPE)
D-link Dwr-116 firmware 1.06 (not an official CPE)
D-link Dwr-512 firmware 2.02 (not an official CPE)
D-link Dwr-712 firmware 2.02 (not an official CPE)
D-link Dwr-912 firmware 2.02 (not an official CPE)
D-link Dwr-921 firmware 2.02 (not an official CPE)
Advisory | Patch | Confirmed | Link |
---|---|---|---|
20181012 Multiple vulnerabilities in D-Link routers | |||
http://sploit.tech/2018/10/12/D-Link.html |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (ID 22)
Related CAPEC 7
Relative Path Traversal (CAPEC-ID 139)
Directory Traversal (CAPEC-ID 213)
File System Function Injection, Content Based (CAPEC-ID 23)
Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64)
Manipulating Input to File System Calls (CAPEC-ID 76)
Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78)
Using Slashes in Alternate Encoding (CAPEC-ID 79)