A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.

Project Subscriptions

Vendors Products
Dsr-1000 Subscribe
Dsr-1000 Firmware Subscribe
Dsr-1000ac Subscribe
Dsr-1000ac Firmware Subscribe
Dsr-1000n Subscribe
Dsr-1000n Firmware Subscribe
Dsr-150 Subscribe
Dsr-150 Firmware Subscribe
Dsr-150n Subscribe
Dsr-150n Firmware Subscribe
Dsr-250 Subscribe
Dsr-250 Firmware Subscribe
Dsr-250n Subscribe
Dsr-250n Firmware Subscribe
Dsr-500 Subscribe
Dsr-500 Firmware Subscribe
Dsr-500ac Subscribe
Dsr-500ac Firmware Subscribe
Dsr-500n Subscribe
Dsr-500n Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-18408 A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:40:36.937Z

Reserved: 2020-09-18T00:00:00

Link: CVE-2020-25757

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-15T20:15:16.183

Modified: 2024-11-21T05:18:40.930

Link: CVE-2020-25757

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses