Security
Games
Windows
Linux
Android
IOS
News
Reviews
AI
CVE-2018-6211 Vulnerability Details
/
/
/
CVE-2018-6211 Metadata Quick Info
CVE Published: 20/06/2018
|
CVE Updated: 05/08/2024
|
CVE Year: 2018
Source: mitre
|
Vendor: n/a
|
Product: n/a
Status : PUBLISHED
CVE-2018-6211 Description
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, OS command injection is possible as a result of incorrect processing of the res_buf parameter to index.cgi.
Metrics
CVSS Version: 3.1
|
Base Score: n/a
Vector: n/a
l➤ Exploitability Metrics:
Attack Vector (AV)*
Attack Complexity (AC)*
Privileges Required (PR)*
User Interaction (UI)*
Scope (S)*
l➤ Impact Metrics:
Confidentiality Impact (C)*
Integrity Impact (I)*
Availability Impact (A)*
Weakness Enumeration (CWE)
CWE-ID:
CWE Name: n/a
Source: n/a
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).
Last added CVEs
▸ CVE-2024-9999 ◂
Discovered: 12/11/2024
Status: PUBLISHED
▸ CVE-2024-9997 ◂
Discovered: 29/10/2024
Status: PUBLISHED
▸ CVE-2024-9996 ◂
Discovered: 29/10/2024
Status: PUBLISHED
Tags:
CVE-2018-6211 Vulnerability Details