4 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 1

The D-Link DSR-250 (3.14) DSR-1000N (2.11B201) UPnP service contains a command injection vulnerability, which can cause remote command execution. El servicio UPnP de D-Link DSR-250 (3.14) DSR-1000N (2.11B201), contiene una vulnerabilidad de inyección de comandos, que puede causar una ejecución de comandos remota • https://gist.github.com/WinMin/5b2bc43b517503472bb28a298981ed5a https://www.dlink.com/en/security-bulletin • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 20EXPL: 0

An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests. Se detectó un problema en los dispositivos D-Link DSR-250 versión 3.17. Determinada funcionalidad en la interfaz web Unified Services Router podría permitir a un atacante autenticado ejecutar comandos arbitrarios, debido a una falta de comprobación de entradas proporcionadas en peticiones HTTP POST de múltiples partes • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10195 https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers https://www.dlink.com/en/security-bulletin • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 20EXPL: 0

An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root. Se detectó un problema en los dispositivos D-Link DSR-250 versión 3.17. Una comprobación insuficiente de checksums del archivo de configuración, podría permitir a un atacante autenticado remoto inyectar entradas crontab arbitrarias en las configuraciones guardadas antes de cargarlas. • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10195 https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers https://www.dlink.com/en/security-bulletin • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 8.8EPSS: 0%CPEs: 20EXPL: 0

A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17. Una falta de comprobación de entrada y controles de acceso en Lua CGI en enrutadores D-Link DSR VPN, puede resultar en una entrada arbitraria que es pasada a las API de comando del sistema, resultando en una ejecución de comandos arbitrarios con privilegios root. Esto afecta a DSR-150, DSR-250, DSR-500 y DSR-1000AC con versiones de firmware 3.14 y 3.17 • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10195 https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers https://www.dlink.com/en/security-bulletin • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •