var-201708-0273
Vulnerability from variot

D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin. plural D-Link There are authentication vulnerabilities in the product firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-link specializes in the design and development of wireless network and Ethernet road hardware products. Multiple D-link products have security vulnerabilities that allow an attacker to exploit the vulnerability to bypass the authentication mechanism and gain unauthorized access. Multiple D-Link Products are prone to multiple authentication-bypass vulnerabilities. This may aid in further attacks. D-Link DNS-320L and others are network storage devices of D-Link. A security vulnerability exists in several D-Link products. The following products and versions are affected: D-Link DNS-320L with firmware version prior to 1.04b12; DNS-327L with firmware version prior to 1.03b04 Build0119; DNR-326 with firmware version 1.40b03; DNS with firmware version 1.02b01 -320B; DNS-345 with firmware version 1.03b06; DNS-325 with firmware version 1.05b03; DNS-322L with firmware version 2.00b07. Overwiew

SEARCH-LAB performed an independent security assessment on four different D-Link devices. The assessment has identified altogether 53 unique vulnerabilities in the latest firmware (dated 30-07-2014). Several vulnerabilities can be abused by a remote attacker to execute arbitrary code and gain full control over the devices. We list below several of the problematic areas, where the most critical findings were discovered: - Authentication can be bypassed in several ways, allowing an attacker to take full control over the device without the need to exploit any programming or design bugs. - We found a few half-baked security workarounds to fix earlier vulnerabilities that introduced even more serious problems, leading to command injection and the possibility to take full control over the device. - Even though there were several security patches and workarounds in the session management part of the code, where we still found serious problems. It was still possible to perform unauthenticated file upload to an arbitrarily chosen location, which also lead to the possibility for an attacker to take full control over the device. - Default users (root, nobody) can be used during authentication, and the administrator cannot change the default (empty) password of these users from the user interface.

Details and CVEs

For the specific details see our full report in [SL-ADV]. We suppose that some of the vulnerabilities were discovered by other researchers too, but we saw it reasonable and useful to publish our findings in such a comprehensive study. Naturally in the report we tried to find and reference all of the previous publications that may have found the same problems. We obtained the following CVE numbers for the above described vulnerabilities: - CVE-2014-7858: Check_login bypass vulnerability in DNR-326 - CVE-2014-7859: Buffer overflow in login_mgr.cgi and in file_sharing.cgi - CVE-2014-7860: Unauthenticated photo publish We also reported two other authentication bypass vulnerabilities (CVE-2014-7857) to D-Link; but since these problems have not been addressed correctly yet, we will only publish them after 22/06/2015.

Affected devices

Main targeted devices during the assessment: - DNS-320, Revision A: 2.03, 13/05/2013 - DNS-320L, 1.03b04, 11/11/2013 - DNS-327L, 1.02, 02/07/2014 - DNR-326, 1.40b03, 7/19/2013

Other devices were influenced by one or more vulnerabilities: - DNS-320B, 1,02b01, 23/04/2014 - DNS-345, 1.03b06, 30/07/2014 - DNS-325, 1.05b03, 30/12/2013 - DNS-322L, 2.00b07

See [SL-ADV] for the complete vulnerability matrix at the time of the assessment. We note that other devices may also be vulnerable.

Solution

Most of the vulnerabilities were fixed in: - DNS-320L 1.04.B12 - DNS-327L 1.03.B04

Some of the vulnerabilities were fixed in: - DNR-326 2.10.B03 - DNR-322L 2.10.B03

Besides installing the patches, where available, we highly recommend not to expose the web interface of the DNS and DNR devices to the internet. Since the devices use the UPnP feature, you should disable it in the router.

Credits

These vulnerabilities were discovered and researched by Gergely Eberhardt (@ebux25) from SEARCH-LAB Ltd

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201708-0273",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dns-325",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.05b03"
      },
      {
        "model": "dns-320b",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.02b01"
      },
      {
        "model": "dns-327l",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.02"
      },
      {
        "model": "dnr-326",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.40b03"
      },
      {
        "model": "dns-320l",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.03b04"
      },
      {
        "model": "dns-345",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "1.03b06"
      },
      {
        "model": "dns-322l",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "d link",
        "version": "2.00b07"
      },
      {
        "model": "dns-327l",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "d link",
        "version": "1.02"
      },
      {
        "model": "d-link dnr-326",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.40b03"
      },
      {
        "model": "d-link dns-320b",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.02b01"
      },
      {
        "model": "d-link dns-320l",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.04b12"
      },
      {
        "model": "d-link dns-322l",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "2.00b07"
      },
      {
        "model": "d-link dns-325",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.05b03"
      },
      {
        "model": "d-link dns-327l",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.03b04 build0119"
      },
      {
        "model": "d-link dns-345",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "1.03b06"
      },
      {
        "model": "router",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dnr-326",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.40b03"
      },
      {
        "model": "dns-320l",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b04"
      },
      {
        "model": "dns-320b",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.02b01"
      },
      {
        "model": "dns-345",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.03b06"
      },
      {
        "model": "dns-322l",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "2.00b07"
      },
      {
        "model": "dns-325",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.05b03"
      },
      {
        "model": "dns-345 1.03b06",
        "scope": null,
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dns-325 1.05b03",
        "scope": null,
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dns-322l 2.00b07",
        "scope": null,
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dns-320l 1.03b04",
        "scope": null,
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dns-320b 1.02b01",
        "scope": null,
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dns-320",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "d link",
        "version": "2.03"
      },
      {
        "model": "dnr-326 1.40b03",
        "scope": null,
        "trust": 0.3,
        "vendor": "d link",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "db": "BID",
        "id": "74880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:d-link:dns-322l_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2.00b07",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dns-322l:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:d-link:dns-325_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.05b03",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:d-link:dns-345_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.03b06",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:d-link:dns-320b_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.02b01",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dns-320b:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:d-link:dnr-326_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.40b03",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:d-link:dns-327l_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.02",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:d-link:dns-320l_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "1.03b04",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Search-Laboratory Ltd.",
    "sources": [
      {
        "db": "BID",
        "id": "74880"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2014-7857",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2014-7857",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-03603",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-75802",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2014-7857",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-7857",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-03603",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201506-080",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-75802",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2014-7857",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-7857"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session\u0027s cookie to username=admin. plural D-Link There are authentication vulnerabilities in the product firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-link specializes in the design and development of wireless network and Ethernet road hardware products. Multiple D-link products have security vulnerabilities that allow an attacker to exploit the vulnerability to bypass the authentication mechanism and gain unauthorized access. Multiple D-Link Products are prone to multiple authentication-bypass vulnerabilities. This may aid in further attacks. D-Link DNS-320L and others are network storage devices of D-Link. A security vulnerability exists in several D-Link products. The following products and versions are affected: D-Link DNS-320L with firmware version prior to 1.04b12; DNS-327L with firmware version prior to 1.03b04 Build0119; DNR-326 with firmware version 1.40b03; DNS with firmware version 1.02b01 -320B; DNS-345 with firmware version 1.03b06; DNS-325 with firmware version 1.05b03; DNS-322L with firmware version 2.00b07. Overwiew\n--------\nSEARCH-LAB performed an independent security assessment on four\ndifferent D-Link devices. The assessment has identified altogether 53\nunique vulnerabilities in the latest firmware (dated 30-07-2014). \nSeveral vulnerabilities can be abused by a remote attacker to execute\narbitrary code and gain full control over the devices. We list below\nseveral of the problematic areas, where the most critical findings were\ndiscovered:\n- Authentication can be bypassed in several ways, allowing an attacker\nto take full control over the device without the need to exploit any\nprogramming or design bugs. \n- We found a few half-baked security workarounds to fix earlier\nvulnerabilities that introduced even more serious problems, leading to\ncommand injection and the possibility to take full control over the device. \n- Even though there were several security patches and workarounds in the\nsession management part of the code, where we still found serious\nproblems. It was still possible to perform unauthenticated file upload\nto an arbitrarily chosen location, which also lead to the possibility\nfor an attacker to take full control over the device. \n- Default users (root, nobody) can be used during authentication, and\nthe administrator cannot change the default (empty) password of these\nusers from the user interface. \n\nDetails and CVEs\n----------------\nFor the specific details see our full report in [SL-ADV]. We suppose\nthat some of the vulnerabilities were discovered by other researchers\ntoo, but we saw it reasonable and useful to publish our findings in such\na comprehensive study. Naturally in the report we tried to find and\nreference all of the previous publications that may have found the same\nproblems. \nWe obtained the following CVE numbers for the above described\nvulnerabilities:\n- CVE-2014-7858: Check_login bypass vulnerability in DNR-326\n- CVE-2014-7859: Buffer overflow in login_mgr.cgi and in file_sharing.cgi\n- CVE-2014-7860: Unauthenticated photo publish\nWe also reported two other authentication bypass vulnerabilities\n(CVE-2014-7857) to D-Link; but since these problems have not been\naddressed correctly yet, we will only publish them after 22/06/2015. \n\nAffected devices\n----------------\nMain targeted devices during the assessment:\n- DNS-320, Revision A: 2.03, 13/05/2013\n- DNS-320L, 1.03b04, 11/11/2013\n- DNS-327L, 1.02, 02/07/2014\n- DNR-326, 1.40b03, 7/19/2013\n\nOther devices were influenced by one or more vulnerabilities:\n- DNS-320B, 1,02b01, 23/04/2014\n- DNS-345, 1.03b06, 30/07/2014\n- DNS-325, 1.05b03, 30/12/2013\n- DNS-322L, 2.00b07\n\nSee [SL-ADV] for the complete vulnerability matrix at the time of the\nassessment. We note that other devices may also be vulnerable. \n\nSolution\n--------\nMost of the vulnerabilities were fixed in:\n- DNS-320L 1.04.B12\n- DNS-327L 1.03.B04\n\nSome of the vulnerabilities were fixed in:\n- DNR-326 2.10.B03\n- DNR-322L 2.10.B03\n\nBesides installing the patches, where available, we highly recommend not\nto expose the web interface of the DNS and DNR devices to the internet. \nSince the devices use the UPnP feature, you should disable it in the router. \n\nCredits\n-------\nThese vulnerabilities were discovered and researched by Gergely\nEberhardt (@ebux25) from SEARCH-LAB Ltd",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "db": "BID",
        "id": "74880"
      },
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-7857"
      },
      {
        "db": "PACKETSTORM",
        "id": "132075"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-75802",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-7857",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "74880",
        "trust": 2.7
      },
      {
        "db": "PACKETSTORM",
        "id": "132075",
        "trust": 1.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-75802",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-7857",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-7857"
      },
      {
        "db": "BID",
        "id": "74880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "PACKETSTORM",
        "id": "132075"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "id": "VAR-201708-0273",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      }
    ],
    "trust": 1.380086558
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:37:18.424000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "DNS-320L",
        "trust": 0.8,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-320l"
      },
      {
        "title": "DNS-327L",
        "trust": 0.8,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-327l"
      },
      {
        "title": "DNS-345",
        "trust": 0.8,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-345"
      },
      {
        "title": "DNS-325",
        "trust": 0.8,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-325"
      },
      {
        "title": "DNR-326",
        "trust": 0.8,
        "url": "http://support.dlink.com/productinfo.aspx?m=dnr-326"
      },
      {
        "title": "DNR-322L",
        "trust": 0.8,
        "url": "http://support.dlink.com/productinfo.aspx?m=dnr-322l"
      },
      {
        "title": "DNS-320",
        "trust": 0.8,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-320"
      },
      {
        "title": "Multiple D-Link Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=234993"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.search-lab.hu/media/d-link_security_advisory_3_0_public.pdf"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/74880"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/535626/100/200/threaded"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2015/may/125"
      },
      {
        "trust": 1.8,
        "url": "http://packetstormsecurity.com/files/132075/d-link-bypass-buffer-overflow.html"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7857"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7857"
      },
      {
        "trust": 0.3,
        "url": "http://www.dlink.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/287.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-345"
      },
      {
        "trust": 0.1,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-320"
      },
      {
        "trust": 0.1,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-320l"
      },
      {
        "trust": 0.1,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-325"
      },
      {
        "trust": 0.1,
        "url": "http://support.dlink.com/productinfo.aspx?m=dnr-322l"
      },
      {
        "trust": 0.1,
        "url": "http://support.dlink.com/productinfo.aspx?m=dns-327l"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7859"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7858"
      },
      {
        "trust": 0.1,
        "url": "https://www.search-lab.hu)"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7860"
      },
      {
        "trust": 0.1,
        "url": "http://support.dlink.com/productinfo.aspx?m=dnr-326"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-7857"
      },
      {
        "db": "BID",
        "id": "74880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "PACKETSTORM",
        "id": "132075"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-7857"
      },
      {
        "db": "BID",
        "id": "74880"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "db": "PACKETSTORM",
        "id": "132075"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-06-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "date": "2017-08-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "date": "2017-08-25T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-7857"
      },
      {
        "date": "2015-05-28T00:00:00",
        "db": "BID",
        "id": "74880"
      },
      {
        "date": "2017-09-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "date": "2015-05-28T13:03:33",
        "db": "PACKETSTORM",
        "id": "132075"
      },
      {
        "date": "2017-08-25T18:29:00.230000",
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "date": "2015-05-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-06-05T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-03603"
      },
      {
        "date": "2018-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-75802"
      },
      {
        "date": "2018-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-7857"
      },
      {
        "date": "2015-05-28T00:00:00",
        "db": "BID",
        "id": "74880"
      },
      {
        "date": "2017-09-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      },
      {
        "date": "2023-04-26T18:55:30.893000",
        "db": "NVD",
        "id": "CVE-2014-7857"
      },
      {
        "date": "2023-04-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "132075"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  D-Link Authentication vulnerabilities in product firmware",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008363"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-080"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.