⚠️ CISA Known Exploited Vulnerability
Active ThreatThis vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.
CVE-2018-6530
Critical CISA KEVVulnerability Description
OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
3 configuration(s) from 1 vendor(s)
cpe:2.3:o:dlink:dir-880l_firmware:1.08b04:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-880l_firmware:1.07.b08:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-880l_firmware:1.07:*:*:*:*:*:*:*
References & Resources
-
ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-860L/REVA/DIR-860L_REVA_FIRMWARE_PATCH_NOTES_1.11B01_EN_WW.pdfcve@mitre.org Release Notes Vendor Advisory
-
ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-868L/REVA/DIR-868L_REVA_FIRMWARE_PATCH_NOTES_1.20B01_EN_WW.pdfcve@mitre.org Release Notes Vendor Advisory
-
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-865L/REVA/DIR-865L_REVA_FIRMWARE_PATCH_NOTES_1.10B01_EN_WW.pdfcve@mitre.org Release Notes Vendor Advisory
-
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-880L/REVA/DIR-880L_REVA_FIRMWARE_PATCH_NOTES_1.08B06_EN_WW.pdfcve@mitre.org Release Notes Vendor Advisory
-
https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-protocve@mitre.org Exploit Third Party Advisory
-
ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-860L/REVA/DIR-860L_REVA_FIRMWARE_PATCH_NOTES_1.11B01_EN_WW.pdfaf854a3a-2127-422b-91ae-364da2661108 Release Notes Vendor Advisory
-
ftp://FTP2.DLINK.COM/SECURITY_ADVISEMENTS/DIR-868L/REVA/DIR-868L_REVA_FIRMWARE_PATCH_NOTES_1.20B01_EN_WW.pdfaf854a3a-2127-422b-91ae-364da2661108 Release Notes Vendor Advisory
-
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-865L/REVA/DIR-865L_REVA_FIRMWARE_PATCH_NOTES_1.10B01_EN_WW.pdfaf854a3a-2127-422b-91ae-364da2661108 Release Notes Vendor Advisory
-
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-880L/REVA/DIR-880L_REVA_FIRMWARE_PATCH_NOTES_1.08B06_EN_WW.pdfaf854a3a-2127-422b-91ae-364da2661108 Release Notes Vendor Advisory
-
https://github.com/TheBeeMan/Pwning-multiple-dlink-router-via-SOAP-protoaf854a3a-2127-422b-91ae-364da2661108 Exploit Third Party Advisory
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-6530134c704f-9b21-4f2e-91b3-4a467353bcc0 US Government Resource
Severity Details
CISA KEV Status
Listed in CISA's Known Exploited Vulnerabilities catalog
Key Information
- Published Date
- March 06, 2018
