An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. They expose an FTP server that serves by default on port 9000 and has hardcoded credentials (admin, admin). Taking advantage of this, a remote unauthenticated attacker could execute arbitrary PHP code by uploading any file in the web root directory and then accessing it via a request.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/45533/ | third party advisory vdb entry exploit |
https://www.secureauth.com/labs/advisories/d-link-central-wifimanager-software-controller-multiple-vulnerabilities | third party advisory exploit |
http://seclists.org/fulldisclosure/2018/Oct/11 | mailing list third party advisory exploit |
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10092 | patch vendor advisory |