⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2018-10823

Severity
8.8HIGH
EPSS
94.0%
top 0.11%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedOct 17
Latest updateMay 13

Description

An issue was discovered on D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

🔴Vulnerability Details

3
GHSA
GHSA-qh9h-ccxh-x284: An issue was discovered on D-Link DWR-116 through 12022-05-13
CVEList
CVE-2018-10823: An issue was discovered on D-Link DWR-116 through 12018-10-17
VulnCheck
D-Link dwr-116_firmware Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')2018

💥Exploits & PoCs

2
Exploit-DB
D-Link Routers - Command Injection2018-10-12
Nuclei
D-Link Routers - Remote Command Injection

🔍Detection Rules

1
Suricata
ET EXPLOIT D-Link DWR Command Injection Inbound (CVE-2018-10823)2022-04-14
CVE-2018-10823 (HIGH CVSS 8.8) | An issue was discovered on D-Link D | cvebase.io