Vulnerability identifier: #VU49091
Vulnerability risk: Medium
CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-912
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
DSL-2888A
Hardware solutions /
Routers for home users
Vendor: D-Link
Description
The vulnerability allows a remote user to escalate privileges on the device.
The vulnerability exists due to presence of hidden functionality in firmware. A remote authenticated user can execute arbitrary OS commands via "cmd" parameter to "/cgi-bin/execute_cmd.cgi" script.
Example:
http://DeviceIP/cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=ls
Mitigation
Install updates from vendor's website.
Vulnerable software versions
DSL-2888A: 2.00 - 2.29
External links
http://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=28241
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.