Description
An issue was discovered on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. The administrative password is stored in plaintext in the /tmp/csman/0 file. An attacker having a directory traversal (or LFI) can easily get full router access.
Exploits (1)
References (2)
Core 2
Core References
Exploit, Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
https://seclists.org/fulldisclosure/2018/Oct/36
Exploit, Third Party Advisory x_refsource_misc
http://sploit.tech/2018/10/12/D-Link.html
Scores
CVSS v3
9.8
EPSS
0.4290
EPSS Percentile
97.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-22
CWE-522
Status
published
Products (8)
dlink/dir-140l_firmware
< 1.02
dlink/dir-640l_firmware
< 1.02
dlink/dwr-111_firmware
< 1.01
dlink/dwr-116_firmware
< 1.06
dlink/dwr-512_firmware
< 2.02
dlink/dwr-712_firmware
< 2.02
dlink/dwr-912_firmware
< 2.02
dlink/dwr-921_firmware
< 2.02
Published
Oct 17, 2018
Tracked Since
Feb 18, 2026