Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-6212


On D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, a reflected Cross-Site Scripting (XSS) attack is possible as a result of missed filtration for special characters in the "Search" field and incorrect processing of the XMLHttpRequest object.


Published

2018-06-20T16:29:00.390

Last Modified

2024-11-21T04:10:18.703

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System d-link dir-620_firmware 1.0.3 Yes
Operating System d-link dir-620_firmware 1.0.37 Yes
Operating System d-link dir-620_firmware 1.3.1 Yes
Operating System d-link dir-620_firmware 1.3.3 Yes
Operating System d-link dir-620_firmware 1.3.7 Yes
Operating System d-link dir-620_firmware 1.4.0 Yes
Operating System d-link dir-620_firmware 2.0.22 Yes
Hardware dlink dir-620 - No

References