Connect with us

Hi, what are you looking for?


Mobile & Wireless

D-Link Patches Code Execution, XSS Flaws in Management Tool

D-Link has released patches for several remote code execution and cross-site scripting (XSS) vulnerabilities found by researchers in the company’s Central WiFiManager access point management tool.

D-Link has released patches for several remote code execution and cross-site scripting (XSS) vulnerabilities found by researchers in the company’s Central WiFiManager access point management tool.

Central WiFiManager allows organizations to create and manage multi-site and multi-tenancy wireless networks. The software can be deployed both locally and in the cloud.

Researchers at SecureAuth + CoreSecurity discovered that version 1.03 – and possibly others – of Central WiFiManager for Windows is affected by four potentially serious vulnerabilities that can be exploited for arbitrary code execution.

The most severe of the security holes, CVE-2018-17440, is related to the fact that the web app includes an FTP server running on port 9000 with the default credentials admin/admin. An attacker can use it to establish a connection to the server and upload a specially crafted PHP file. Requesting this file can lead to arbitrary code execution.

Another code execution vulnerability discovered by researchers is CVE-2018-17442, which also involves uploading arbitrary files. The tool allows users to upload RAR archives and experts noticed that they can abuse the functionality to upload archives that include a PHP file whose content will be executed in the context of the web application. However, SecureAuth + CoreSecurity noted in its advisory that authentication is required for exploitation.

“When the .rar is uploaded is stored in the path ‘webcaptivalportal’ in a folder with a timestamp created by the PHP time() function. In order to know what is the web server’s time we request an information file that contains the time we are looking for. After we have the server’s time we upload the .rar, calculate the proper epoch and request the appropriate path increasing this epoch by one until we hit the correct one,” the security firm said in its advisory.

Experts also discovered two stored XSS flaws in the “UpdateSite” (CVE-2018-17443) and “addUser” (CVE-2018-17441) functionality, specifically the sitename and username parameters, respectively.

The vulnerabilities were reported to D-Link in early June and they were patched recently with the release of version 1.03R0100-Beta1.

Advertisement. Scroll to continue reading.

“This disclosure directly affects the software package and current installations should be update with the new released available to download below. Failure to update may put this software package, the host computer it runs on, and D-Link devices that it manages at risk,” D-Link said in its own advisory.

Related: Hackers Using Stolen D-Link Certificates for Malware Signing

Related: Serious Vulnerability Affects Over 120 D-Link Products

Related: D-Link Patches Recently Disclosed Router Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.


People on the Move

Jeff Miller has been named the CIO of Clayco after serving as CISO at Quantinuum.

ZeroFox has appointed David Muse as its new CEO, Andrew McKenna as CFO and James McCarthy as CRO.

Fastly announced that Scott Lovett will join the company as Chief Revenue Officer, effective June 3, 2024.

More People On The Move

Expert Insights