Learn about CVE-2019-13372, a critical vulnerability in D-Link Central WiFi Manager CWM(100) allowing remote code execution. Find mitigation steps and system protection measures.
D-Link Central WiFi Manager CWM(100) before version v1.03R0100_BETA6 is vulnerable to remote code execution due to an eval injection in the username field of a cookie.
Understanding CVE-2019-13372
This CVE identifies a critical vulnerability in D-Link Central WiFi Manager CWM(100) that allows remote attackers to execute unauthorized PHP code.
What is CVE-2019-13372?
The vulnerability in the /web/Lib/Action/IndexAction.class.php file of D-Link Central WiFi Manager CWM(100) enables attackers to execute PHP code remotely by exploiting an eval injection in the username field of a cookie.
The Impact of CVE-2019-13372
The presence of eval injection in the username field of a cookie allows remote attackers to bypass authentication by leaving the password field empty, leading to unauthorized PHP code execution.
Technical Details of CVE-2019-13372
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie due to eval injection in the username field.
Affected Systems and Versions
Exploitation Mechanism
Attackers exploit the eval injection in the username field of a cookie to execute unauthorized PHP code remotely.
Mitigation and Prevention
Protecting systems from CVE-2019-13372 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates