CVE-2018-19410
CRITICAL KEV NUCLEIPRTG Network Monitor <18.2.40.1683 - Local File Inclusion
Title source: llmDescription
PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).
Exploits (1)
Nuclei Templates (1)
PRTG Network Monitor - Local File Inclusion
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
http.favicon.hash:"-655683626" || http.title:"prtg"
FOFA:
icon_hash=-655683626 || title="prtg"
Scores
CVSS v3
9.8
EPSS
0.9300
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2025-02-04
VulnCheck KEV
2025-02-04
ENISA EUVD
EUVD-2018-11103
Status
published
Products (1)
paessler/prtg_network_monitor
< 18.2.40.1683
Published
Nov 21, 2018
KEV Added
Feb 04, 2025
Tracked Since
Feb 18, 2026