In the /HNAP1/SetQoSSettings message, the uplink parameter is vulnerable, and the vulnerability affects D-Link DIR-822 Rev.B 202KRb06 and DIR-822 Rev.C 3.10B06 devices. In the SetQoSSettings.php source code, the uplink parameter is saved in the /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth internal configuration memory without any regex checking. And in the bwc_tc_spq_start, bwc_tc_wfq_start, and bwc_tc_adb_start functions of the bwcsvcs.php source code, the data in /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth is used with the tc command without any regex checking. A vulnerable /HNAP1/SetQoSSettings XML message could have shell metacharacters in the uplink element such as the `telnetd` string.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-05-13T13:25:14

Updated: 2019-05-13T13:25:14

Reserved: 2018-12-09T00:00:00


Link: CVE-2018-19989

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-05-13T14:29:01.330

Modified: 2023-04-26T19:27:52.350


Link: CVE-2018-19989

JSON object: View

cve-icon Redhat Information

No data.

CWE