On D-Link DAP-1530 (A1) before firmware version 1.06b01, DAP-1610 (A1) before firmware version 1.06b01, DWR-111 (A1) before firmware version 1.02v02, DWR-116 (A1) before firmware version 1.06b03, DWR-512 (B1) before firmware version 2.02b01, DWR-711 (A1) through firmware version 1.11, DWR-712 (B1) before firmware version 2.04b01, DWR-921 (A1) before firmware version 1.02b01, and DWR-921 (B1) before firmware version 2.03b01, there exists an EXCU_SHELL file in the web directory. By sending a GET request with specially crafted headers to the /EXCU_SHELL URI, an attacker could execute arbitrary shell commands in the root context on the affected device. Other devices might be affected as well.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| d-link | dap-1530_firmware | 1.05 | - |
| d-link | dap-1610_firmware | 1.05 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
11
Affected Products
8
References
d-link / dap-1530_firmware
| - |
| dlink | dwr-111_firmware | 1.01 | - |
| d-link | dwr-116_firmware | - | - |
| d-link | dwr-116_firmware | - | - |
| dlink | dwr-116_firmware | 1.05 | - |
| dlink | dwr-512_firmware | 2.02 | - |
| d-link | dwr-711_firmware | 1.11 | - |
| dlink | dwr-712_firmware | 2.02 | - |
| dlink | dwr-921_firmware | 1.02 | - |
| dlink | dwr-921_firmware | 2.02 | - |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact