7 results (0.001 seconds)

CVSS: 9.0EPSS: 0%CPEs: 20EXPL: 0

An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests. Se detectó un problema en los dispositivos D-Link DSR-250 versión 3.17. Determinada funcionalidad en la interfaz web Unified Services Router podría permitir a un atacante autenticado ejecutar comandos arbitrarios, debido a una falta de comprobación de entradas proporcionadas en peticiones HTTP POST de múltiples partes • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10195 https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers https://www.dlink.com/en/security-bulletin • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 20EXPL: 0

An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root. Se detectó un problema en los dispositivos D-Link DSR-250 versión 3.17. Una comprobación insuficiente de checksums del archivo de configuración, podría permitir a un atacante autenticado remoto inyectar entradas crontab arbitrarias en las configuraciones guardadas antes de cargarlas. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10195 https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers https://www.dlink.com/en/security-bulletin • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 8.8EPSS: 0%CPEs: 20EXPL: 0

A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17. Una falta de comprobación de entrada y controles de acceso en Lua CGI en enrutadores D-Link DSR VPN, puede resultar en una entrada arbitraria que es pasada a las API de comando del sistema, resultando en una ejecución de comandos arbitrarios con privilegios root. Esto afecta a DSR-150, DSR-250, DSR-500 y DSR-1000AC con versiones de firmware 3.14 y 3.17 • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10195 https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers https://www.dlink.com/en/security-bulletin • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.9EPSS: 0%CPEs: 72EXPL: 1

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 stores account passwords in cleartext, which allows local users to obtain sensitive information by reading the Users[#]["Password"] fields in /tmp/teamf1.cfg.ascii. D-Link DSR-150 con firmware anterior a 1.08B44; DSR-150N con firmware anterior a 1.06B64; DSR-250 y DSR-250N con firmware anterior a 1.08B44; y DSR-500, DSR-500N, DSR-1000 y DSR-1000N con firmware anterior a 1.08B77, almacena contraseñas de cuentas en texto plano, lo cual permite a usuarios locales obtener información sensible leyendo los campos Users[#]["Password"] en 7tmp/teamf1.cfg.ascii. • http://www.exploit-db.com/exploits/30061 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 1%CPEs: 72EXPL: 1

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username. D-Link DSR-150 con firmware anterior a 1.08B44; DSR-150N con firmware anterior a 1.05B64; DSR-250 y DSR-250N con firmware anterior a 1.08B44; y DSR-500, DSR-500N, DSR-1000, y DSR-1000N con firmware anterior a 1.08B77 tienen incrustado el nombre de usuario gkJ9232xXyruTRmY, lo cual facilita a atacantes remotos obtener acceso aprovechando el conocimiento del nombre de usuario. • http://tsd.dlink.com.tw/temp/PMD/12879/DSR-500_500N_1000_1000N_A1_Release_Notes_FW_v1.08B77_WW.pdf http://tsd.dlink.com.tw/temp/PMD/12960/DSR-150N_A2_Release_Notes_FW_v1.05B64_WW.pdf http://tsd.dlink.com.tw/temp/PMD/12966/DSR-150_A1_A2_Release_Notes_FW_v1.08B44_WW.pdf http://tsd.dlink.com.tw/temp/PMD/13039/DSR-250_250N_A1_A2_Release_Notes_FW_v1.08B44_WW_RU.pdf http://www.exploit-db.com/exploits/30061 • CWE-255: Credentials Management Errors •