CrowdSec
5/10CrowdSec Score

D-Link DIR-878 - RCE (CVE-2019-8318)

Published on13-02-2019
First seen on10-03-2025
CVSS 8.8/10D-Link - DIR-878

4919Exploiting IPs reported

An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetSysEmailSettings API function, as demonstrated by shell metacharacters in the SMTPServerPort field.

CrowdSec analysis

CVE-2019-8318 is a command injection vulnerability affecting certain D-Link router models, enabling remote attackers to execute arbitrary OS commands on the device and gain unauthorized root access.

CrowdSec has been tracking this vulnerability and its exploits since 10th of March 2025.

CrowdSec network data shows that most actors exploiting CVE-2019-8318 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. CrowdSec data also reveals a clear uptick in attacks involving CVE-2019-8318 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

Observed exploitation attempts are characterized by requests directed to URLs containing /hnap1.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.