CrowdSec
8/10CrowdSec Score

Dell EMC iDRAC - RCE (CVE-2018-1207)

Published on23-03-2018
First seen on26-09-2025
CVSS 9.8/10Dell - EMC iDRAC

73Exploiting IPs reported

Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code.

CrowdSec analysis

CVE-2018-1207 is a critical CGI injection vulnerability in Dell EMC iDRAC7 and iDRAC8 versions prior to 2.52.52.52, allowing remote unauthenticated attackers to execute arbitrary code on affected systems. This flaw could be exploited to gain full control over the device, leading to potential data breaches, system manipulation, or service disruption.

CrowdSec has been tracking this vulnerability and its exploits since 25th of September 2025.

Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2018-1207 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2018-1207 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2018-1207 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit this vulnerability by sending crafted requests to /cgi-bin/login with the LD_DEBUG parameter, enabling remote code injection on Dell iDRAC7/8 devices.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.