Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2019-13372 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Remote Code Execution (RCE) via **Code Injection**. πŸ“‰ **Consequences**: Attackers can execute arbitrary PHP code, completely compromising the **D-Link Central WiFi Manager CWM-100**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection). The file `/web/Lib/Action/IndexAction.class.php` fails to filter special elements in external input. Specifically, the **username cookie field** allows `eval` injection.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **D-Link Central WiFi Manager CWM-100**. πŸ“… **Versions**: Before **v1.03R0100_BETA6**. 🏒 **Vendor**: D-Link (Taiwan).

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Power**: Full **Remote Code Execution**. πŸ“‚ **Data Access**: Can read/modify any data on the server. πŸ”“ **Privileges**: Gains control over the web application and underlying OS via PHP execution.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: **LOW**. 🚫 **Auth Bypass**: An **empty password** bypasses authentication entirely. πŸͺ **Vector**: Exploitation happens via a crafted **Cookie** header. No complex setup needed.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp?**: **YES**. πŸ“œ **PoC**: Available via **Nuclei Templates** (ProjectDiscovery) and multiple security blogs (unh3x, PacketStorm). 🌍 **Wild Exploitation**: High risk due to simple cookie-based injection.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **D-Link CWM-100** devices. πŸ§ͺ **Test**: Send a cookie with `username` containing PHP code (e.g., `<?php phpinfo(); ?>`) and an **empty password**. Check for execution response.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. πŸ“₯ **Action**: Upgrade to version **v1.03R0100_BETA6** or later. πŸ“’ **Source**: D-Link Security Advisory **SAP10117**.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Mitigation**: Block external access to the management interface. πŸ›‘ **Restrict**: Use firewall rules to allow only trusted IPs. 🧹 **Input**: If possible, sanitize cookie inputs (though upgrade is best).

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P1**. The combination of **RCE**, **Auth Bypass**, and **Public PoC** makes this an immediate threat. Patch immediately!