DNA View

⚠️ CISA Known Exploited Vulnerability

Active Threat

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.

CVE-2018-6530

Critical CISA KEV
Low Medium High Critical
9.8
CVSS Score
Published: Mar 06, 2018
Last Modified: Nov 07, 2025

Vulnerability Description

OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Known Affected Software

3 configuration(s) from 1 vendor(s)

dir-880l_firmware
Version:
1.08b04
CPE:
cpe:2.3:o:dlink:dir-880l_firmware:1.08b04:*:*:*:*:*:*:*
dir-880l_firmware
Version:
1.07.b08
CPE:
cpe:2.3:o:dlink:dir-880l_firmware:1.07.b08:*:*:*:*:*:*:*
dir-880l_firmware
Version:
1.07
CPE:
cpe:2.3:o:dlink:dir-880l_firmware:1.07:*:*:*:*:*:*:*
This vulnerability affects 3 software configuration(s). Ensure you patch all affected systems.

References & Resources

Severity Details

9.8
out of 10.0
Critical

CISA KEV Status

Active Exploitation

Listed in CISA's Known Exploited Vulnerabilities catalog

Key Information

Published Date
March 06, 2018