This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Remote Code Execution (RCE) via **Code Injection**. π **Consequences**: Attackers can execute arbitrary PHP code, completely compromising the **D-Link Central WiFi Manager CWM-100**.β¦
π‘οΈ **Root Cause**: **CWE-94** (Code Injection). The file `/web/Lib/Action/IndexAction.class.php` fails to filter special elements in external input. Specifically, the **username cookie field** allows `eval` injection.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: **D-Link Central WiFi Manager CWM-100**. π **Versions**: Before **v1.03R0100_BETA6**. π’ **Vendor**: D-Link (Taiwan).
Q4What can hackers do? (Privileges/Data)
π **Attacker Power**: Full **Remote Code Execution**. π **Data Access**: Can read/modify any data on the server. π **Privileges**: Gains control over the web application and underlying OS via PHP execution.
Q5Is exploitation threshold high? (Auth/Config)
β οΈ **Threshold**: **LOW**. π« **Auth Bypass**: An **empty password** bypasses authentication entirely. πͺ **Vector**: Exploitation happens via a crafted **Cookie** header. No complex setup needed.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: **YES**. π **PoC**: Available via **Nuclei Templates** (ProjectDiscovery) and multiple security blogs (unh3x, PacketStorm). π **Wild Exploitation**: High risk due to simple cookie-based injection.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for **D-Link CWM-100** devices. π§ͺ **Test**: Send a cookie with `username` containing PHP code (e.g., `<?php phpinfo(); ?>`) and an **empty password**. Check for execution response.
π§ **No Patch?**: **Mitigation**: Block external access to the management interface. π **Restrict**: Use firewall rules to allow only trusted IPs. π§Ή **Input**: If possible, sanitize cookie inputs (though upgrade is best).
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. π¨ **Priority**: **P1**. The combination of **RCE**, **Auth Bypass**, and **Public PoC** makes this an immediate threat. Patch immediately!