Update CVE-2018-10822.yaml

patch-1
Sandeep Singh 2021-07-26 01:04:31 +05:30 committed by GitHub
parent 9883f04092
commit 0d2e18722a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 3 additions and 3 deletions

View File

@ -3,12 +3,12 @@ id: CVE-2018-10822
info: info:
name: D-Link Routers - Directory Traversal name: D-Link Routers - Directory Traversal
author: daffainfo author: daffainfo
severity: medium severity: high
description: Directory traversal vulnerability in the web interface on D-Link routers DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02,DWR-512 through 2.02,DWR-712 through 2.02,DWR-912 through 2.02, DWR-921 through 2.02, DWR-111 through 1.01, and probably others with the same type of firmware allows remote attackers to read arbitrary files via a /.. or // after “GET /uir” in an HTTP request. description: Directory traversal vulnerability in the web interface on D-Link routers DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02,DWR-512 through 2.02,DWR-712 through 2.02,DWR-912 through 2.02, DWR-921 through 2.02, DWR-111 through 1.01, and probably others with the same type of firmware allows remote attackers to read arbitrary files via a /.. or // after “GET /uir” in an HTTP request.
reference: | reference: |
- https://www.exploit-db.com/exploits/45678 - https://www.exploit-db.com/exploits/45678
- https://www.cvedetails.com/cve/CVE-2018-10822 - https://nvd.nist.gov/vuln/detail/CVE-2018-10822
tags: cve,cve2018,lfi,router tags: cve,cve2018,lfi,router,dlink
requests: requests:
- method: GET - method: GET