1 results (0.006 seconds)

CVSS: 8.8EPSS: 1%CPEs: 6EXPL: 2

On D-Link DCS-5009 devices with firmware 1.08.11 and earlier, DCS-5010 devices with firmware 1.14.09 and earlier, and DCS-5020L devices with firmware before 1.15.01, command injection in alphapd (binary responsible for running the camera's web server) allows remote authenticated attackers to execute code through sanitized /setSystemAdmin user input in the AdminID field being passed directly to a call to system. En dispositivos D-Link DCS-5009 con firmware 1.08.11 y anterior, dispositivos DCS-5010 con firmware 1.14.09 y anterior y dispositivos DCS-5020L con firmware anterior a 1.15.01, la inyección de comandos en alphapd (binario responsable de ejecutar el servidor web de la cámara) permite que los atacantes remotos autenticados ejecuten código al pasar entradas saneadas de usuario /setSystemAdmin en el campo AdminID directamente a una llamada al sistema. • https://www.exploit-db.com/exploits/44580 http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10084 https://www.fidusinfosec.com/dlink-dcs-5030l-remote-code-execution-cve-2017-17020 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •