Bug Trio Affecting Eight D-Link Models Leads to Full Compromise
Several router models from D-Link are vulnerable to three security bugs that could help an attacker get full control over them.
Taken separately, the vulnerabilities are a path traversal, securing passwords in plain text and shell command execution; but by chaining them together an attacker could run code of their own on the devices.
First on the list is the path traversal security gap, identified as CVE-2018-10822, which permits a remote attacker to read arbitrary files. This issue emerged because of an incorrect repair of a different bug reported last year. A flaw like this can get the attacker in the passwords folder, where the administrator credentials reside. This leads to the second vulnerability, passwords stored in plain text, tracked as CVE-2018-10824. Using the path traversal flaw one can access the password folder and check the configuration file containing the sensitive information.