// For flags

CVE-2021-20133

 

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as "/dev/urandom" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd).

Los servicios de Quagga en los DIR-2640 de D-Link menores o iguales a versión 1.11B02, están afectados por una vulnerabilidad de salto de ruta absoluto que permite a un atacante remoto y autenticado establecer el banner "message of the day" en cualquier archivo del sistema, permitiéndole leer todo o parte del contenido de esos archivos. De este modo, puede revelarse información confidencial como credenciales con hash, contraseñas en texto plano embebidas para otros servicios, archivos de configuración y claves privadas. El manejo inapropiado de los nombres de archivo que identifican recursos virtuales, como "/dev/urandom", permite a un atacante realizar un ataque de denegación de servicio contra las interfaces de línea de comandos de los servicios Quagga (zebra y ripd).

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-17 CVE Reserved
  • 2021-12-30 CVE Published
  • 2024-03-23 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dlink
Search vendor "Dlink"
Dir-2640-us Firmware
Search vendor "Dlink" for product "Dir-2640-us Firmware"
<= 1.11b02
Search vendor "Dlink" for product "Dir-2640-us Firmware" and version " <= 1.11b02"
-
Affected
in Dlink
Search vendor "Dlink"
Dir-2640-us
Search vendor "Dlink" for product "Dir-2640-us"
--
Safe