Описание
An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. They expose an FTP server that serves by default on port 9000 and has hardcoded credentials (admin, admin). Taking advantage of this, a remote unauthenticated attacker could execute arbitrary PHP code by uploading any file in the web root directory and then accessing it via a request.
An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. They expose an FTP server that serves by default on port 9000 and has hardcoded credentials (admin, admin). Taking advantage of this, a remote unauthenticated attacker could execute arbitrary PHP code by uploading any file in the web root directory and then accessing it via a request.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-17440
- https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10092
- https://www.exploit-db.com/exploits/45533
- https://www.secureauth.com/labs/advisories/d-link-central-wifimanager-software-controller-multiple-vulnerabilities
- http://seclists.org/fulldisclosure/2018/Oct/11
Связанные уязвимости
An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. They expose an FTP server that serves by default on port 9000 and has hardcoded credentials (admin, admin). Taking advantage of this, a remote unauthenticated attacker could execute arbitrary PHP code by uploading any file in the web root directory and then accessing it via a request.
Уязвимость программного контроллера для централизованного управления беспроводными сетями D-Link Central WiFi Manager, связанная с использованием предустановленных учетных данных, позволяющая нарушителю выполнить произвольный PHP-код