var-201704-1225
Vulnerability from variot

Directory traversal vulnerability in the web interface on the D-Link DWR-116 device with firmware before V1.05b09 allows remote attackers to read arbitrary files via a .. (dot dot) in a "GET /uir/" request. The DWR-116 is a wireless N300 multi-WAN router from D-Link. (double point) in the \"GET/uir/\" request. D-Link DWR-116 is prone to an arbitrary-file-download vulnerability. An attacker can exploit this issue to download arbitrary files from the device filesystem and obtain potentially sensitive information.

NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-6190.

PoC: aaaaa a $ curl http://routerip/uir//etc/passwd aaaaa

The vulnerability can be used retrieve administrative password using the other disclosed vulnerability - CVE-2018-10824

This vulnerability was reported previously by Patryk Bogdan in CVE-2017-6190 but he reported it is fixed in certain release but unfortunately it is still present in even newer releases. The vulnerability is also present in other D-Link routers and can be exploited not only (as the original author stated) by double dot but also absolutely using double slash.

2 Password stored in plaintext in several series of D-Link routers aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

CVE: CVE-2018-10824

An issue was discovered on D-Link routers: aC/ DWR-116 through 1.06, aC/ DIR-140L through 1.02, aC/ DIR-640L through 1.02, aC/ DWR-512 through 2.02, aC/ DWR-712 through 2.02, aC/ DWR-912 through 2.02, aC/ DWR-921 through 2.02, aC/ DWR-111 through 1.01, aC/ and probably others with the same type of firmware.

NOTE: I have changed the filename in description to XXX because the vendor leaves some EOL routers unpatched and the attack is too simple.

The administrative password is stored in plaintext in the /tmp/XXX/0 file.

PoC using the directory traversal vulnerability disclosed at the same time - CVE-2018-10822

aaaaa a $ curl http://routerip/uir//tmp/XXX/0 aaaaa

This command returns a binary config file which contains admin username and password as well as many other router configuration settings.

3 Shell command injection in httpd server of a several series of D-Link routers aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaa

CVE: CVE-2018-10823

CVSS v3: 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)

An issue was discovered on D-Link routers: aC/ DWR-116 through 1.06, aC/ DWR-512 through 2.02, aC/ DWR-712 through 2.02, aC/ DWR-912 through 2.02, aC/ DWR-921 through 2.02, aC/ DWR-111 through 1.01, aC/ and probably others with the same type of firmware.

An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.

PoC: 1. 2. Request the following URL after login: aaaaa a $ curl http://routerip/chkisg.htm%3FSip%3D1.1.1.1%20%7C%20cat%20 %2Fetc%2Fpasswd aaaaa 3. See the passwd file contents in the response.

4 Exploiting all together aaaaaaaaaaaaaaaaaaaaaaaaa

CVSS v3: 10 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

Taking all the three together it is easy to gain full router control including arbitrary code execution.

Description with video: [http://sploit.tech/2018/10/12/D-Link.html]

5 Timeline aaaaaaaaaa

aC/ 09.05.2018 - vendor notified aC/ 06.06.2018 - asked vendor about the status because of long vendor response aC/ 22.06.2018 - received a reply that a patch will be released for DWR-116 and DWR-111, for the other devices which are EOL an announcement will be released aC/ 09.09.2018 - still no reply from vendor about the patches or announcement, I have warned the vendor that if I will not get a reply in a month I will publish the disclosure aC/ 12.10.2018 - disclosing the vulnerabilities

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201704-1225",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dwr-116",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dlink",
        "version": "v1.01\\(eu\\)"
      },
      {
        "model": "dwr-116",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dlink",
        "version": "v1.05\\(au\\)"
      },
      {
        "model": "dwr-116",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "dlink",
        "version": "v1.00\\(cp\\)b10"
      },
      {
        "model": "dwr-116 1.05",
        "scope": null,
        "trust": 0.9,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dwr-116 1.01",
        "scope": null,
        "trust": 0.9,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dwr-116 1.00 b10",
        "scope": null,
        "trust": 0.9,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dwr-116",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.05b09"
      },
      {
        "model": "dwr-116 1.05b09",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "BID",
        "id": "97620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:d-link:dwr-116_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Patryk Bogdan",
    "sources": [
      {
        "db": "BID",
        "id": "97620"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-6190",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-6190",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-05589",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-114393",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-6190",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-6190",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-6190",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-05589",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201704-490",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-114393",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Directory traversal vulnerability in the web interface on the D-Link DWR-116 device with firmware before V1.05b09 allows remote attackers to read arbitrary files via a .. (dot dot) in a \"GET /uir/\" request. The DWR-116 is a wireless N300 multi-WAN router from D-Link. (double point) in the \\\"GET/uir/\\\" request. D-Link DWR-116 is prone to an arbitrary-file-download vulnerability. \nAn attacker can exploit this issue to download arbitrary files from the device filesystem and obtain potentially sensitive information. \n\n  NOTE: this vulnerability exists because of an incorrect fix for\n  CVE-2017-6190. \n\n  PoC:\n  aaaaa\n  a $ curl http://routerip/uir//etc/passwd\n  aaaaa\n\n  The vulnerability can be used retrieve administrative password using\n  the other disclosed vulnerability - CVE-2018-10824\n\n  This vulnerability was reported previously by Patryk Bogdan in\n  CVE-2017-6190 but he reported it is fixed in certain release but\n  unfortunately it is still present in even newer releases. The\n  vulnerability is also present in other D-Link routers and can be\n  exploited not only (as the original author stated) by double dot but\n  also absolutely using double slash. \n\n\n2 Password stored in plaintext in several series of D-Link routers\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\n\n  CVE: CVE-2018-10824\n\n  An issue was discovered on D-Link routers:\n  aC/ DWR-116 through 1.06,\n  aC/ DIR-140L through 1.02,\n  aC/ DIR-640L through 1.02,\n  aC/ DWR-512 through 2.02,\n  aC/ DWR-712 through 2.02,\n  aC/ DWR-912 through 2.02,\n  aC/ DWR-921 through 2.02,\n  aC/ DWR-111 through 1.01,\n  aC/ and probably others with the same type of firmware. \n\n  NOTE: I have changed the filename in description to XXX because the\n  vendor leaves some EOL routers unpatched and the attack is too\nsimple. \n\n  The administrative password is stored in plaintext in the /tmp/XXX/0\n  file. \n\n  PoC using the directory traversal vulnerability disclosed at the same\n  time - CVE-2018-10822\n\n  aaaaa\n  a $ curl http://routerip/uir//tmp/XXX/0\n  aaaaa\n\n  This command returns a binary config file which contains admin\n  username and password as well as many other router configuration\n  settings. \n\n\n3 Shell command injection in httpd server of a several series of D-Link \nrouters\naaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\naaaaaaaa\n\n  CVE: CVE-2018-10823\n\n  CVSS v3: 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\n  An issue was discovered on D-Link routers:\n  aC/ DWR-116 through 1.06,\n  aC/ DWR-512 through 2.02,\n  aC/ DWR-712 through 2.02,\n  aC/ DWR-912 through 2.02,\n  aC/ DWR-921 through 2.02,\n  aC/ DWR-111 through 1.01,\n  aC/ and probably others with the same type of firmware. \n\n  An authenticated attacker may execute arbitrary code by injecting the\n  shell command into the chkisg.htm page Sip parameter. This allows for\n  full control over the device internals. \n\n  PoC:\n  1. \n  2. Request the following URL after login:\n     aaaaa\n     a $ curl http://routerip/chkisg.htm%3FSip%3D1.1.1.1%20%7C%20cat%20\n%2Fetc%2Fpasswd\n     aaaaa\n  3. See the passwd file contents in the response. \n\n\n4 Exploiting all together\naaaaaaaaaaaaaaaaaaaaaaaaa\n\n  CVSS v3: 10 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\n  Taking all the three together it is easy to gain full router control\n  including arbitrary code execution. \n\n  Description with video: [http://sploit.tech/2018/10/12/D-Link.html]\n\n\n5 Timeline\naaaaaaaaaa\n\n  aC/ 09.05.2018 - vendor notified\n  aC/ 06.06.2018 - asked vendor about the status because of long vendor\n    response\n  aC/ 22.06.2018 - received a reply that a patch will be released for\n    DWR-116 and DWR-111, for the other devices which are EOL an\n    announcement will be released\n  aC/ 09.09.2018 - still no reply from vendor about the patches or\n    announcement, I have warned the vendor that if I will not get a\n    reply in a month I will publish the disclosure\n  aC/ 12.10.2018 - disclosing the vulnerabilities\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-6190"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "BID",
        "id": "97620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "db": "PACKETSTORM",
        "id": "149844"
      }
    ],
    "trust": 2.61
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-114393",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-6190",
        "trust": 3.5
      },
      {
        "db": "CXSECURITY",
        "id": "WLB-2017040033",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "97620",
        "trust": 2.0
      },
      {
        "db": "EXPLOIT-DB",
        "id": "41840",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "149844",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "142052",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-114393",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "db": "BID",
        "id": "97620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "PACKETSTORM",
        "id": "149844"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "id": "VAR-201704-1225",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      }
    ],
    "trust": 1.396428565
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:59:19.725000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Wireless N300 Multi-WAN Router DWR-116",
        "trust": 0.8,
        "url": "http://www.dlink.com/uk/en/products/dwr-116-wireless-n300-multi-wan-router"
      },
      {
        "title": "D-LinkDWR-116 patch for arbitrary file download vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/92924"
      },
      {
        "title": "D-Link DWR-116 Web interface Repair measures for path traversal vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70141"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-22",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "https://cxsecurity.com/blad/wlb-2017040033"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/97620"
      },
      {
        "trust": 1.1,
        "url": "https://www.exploit-db.com/exploits/41840/"
      },
      {
        "trust": 0.9,
        "url": "http://seclists.org/bugtraq/2017/apr/28"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6190"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6190"
      },
      {
        "trust": 0.3,
        "url": "http://www.d-link.com"
      },
      {
        "trust": 0.1,
        "url": "http://routerip/uir//tmp/xxx/0"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10822"
      },
      {
        "trust": 0.1,
        "url": "http://sploit.tech/"
      },
      {
        "trust": 0.1,
        "url": "http://routerip/uir//etc/passwd"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10824"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10823"
      },
      {
        "trust": 0.1,
        "url": "http://sploit.tech/2018/10/12/d-link.html]"
      },
      {
        "trust": 0.1,
        "url": "http://routerip/chkisg.htm%3fsip%3d1.1.1.1%20%7c%20cat%20"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "db": "BID",
        "id": "97620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "PACKETSTORM",
        "id": "149844"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "db": "BID",
        "id": "97620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "db": "PACKETSTORM",
        "id": "149844"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "date": "2017-04-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "date": "2017-04-07T00:00:00",
        "db": "BID",
        "id": "97620"
      },
      {
        "date": "2017-05-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "date": "2018-10-18T03:47:09",
        "db": "PACKETSTORM",
        "id": "149844"
      },
      {
        "date": "2017-04-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      },
      {
        "date": "2017-04-10T14:59:00.263000",
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-05589"
      },
      {
        "date": "2017-08-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-114393"
      },
      {
        "date": "2017-04-18T00:06:00",
        "db": "BID",
        "id": "97620"
      },
      {
        "date": "2017-05-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      },
      {
        "date": "2017-05-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      },
      {
        "date": "2024-11-21T03:29:13.253000",
        "db": "NVD",
        "id": "CVE-2017-6190"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link DWR-116 Device firmware  Web Directory traversal vulnerability in the interface",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-003082"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "path traversal",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-490"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.