Vulnerability Details CVE-2018-6211
On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, OS command injection is possible as a result of incorrect processing of the res_buf parameter to index.cgi.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.167
EPSS Ranking 94.6%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 9.0
Products affected by CVE-2018-6211
-
cpe:2.3:h:dlink:dir-620:-
-
cpe:2.3:o:d-link:dir-620_firmware:1.0.3
-
cpe:2.3:o:d-link:dir-620_firmware:1.0.37
-
cpe:2.3:o:d-link:dir-620_firmware:1.3.1
-
cpe:2.3:o:d-link:dir-620_firmware:1.3.3
-
cpe:2.3:o:d-link:dir-620_firmware:1.3.7
-
cpe:2.3:o:d-link:dir-620_firmware:1.4.0
-
cpe:2.3:o:d-link:dir-620_firmware:2.0.22