ID

VAR-E-201803-0358


EDB ID

44580


TITLE

DLINK DCS-5020L - Remote Code Execution (PoC) - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 44580

DESCRIPTION

DLINK DCS-5020L - Remote Code Execution (PoC). CVE-cve 2017-17020 . webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 44580

AFFECTED PRODUCTS

vendor:dlinkmodel:dcs-5020lscope: - version: -

Trust: 1.6

sources: EXPLOIT-DB: 44580 // EDBNET: 97724

EXPLOIT

“The DCS-5020L Wireless N Day & Night Pan/Tilt Cloud Camera is a day/night network camera that easily connects to your existing home network for remote viewing on a range of mobile devices. It features pan, tilt and digital zoom function to allow you to see a wider area with a single camera, built-in Wi-Fi extender to effortlessly expand your wireless coverage, night vision up to 5 metres, sound and motion detection for the ultimate in peace of mind, and H.264 video compression for a high-quality image.”

This walkthrough demonstrates just how easy it can be to find vulnerabilities in Internet of Things (IOT) devices. The process of finding the following command injection can be broken down into 3 steps that are more akin to a 100 point CTF challenge: download binary, run strings, trace input to system call to origin.

An attacker can escape the ‘sed’ command with a simple payload, such as ‘`touch a`’. Another example that fits is AdminID=a’`telnetd`’, which allows a user to login as “a”, which becomes the new root account:

Source: https://www.fidusinfosec.com/dlink-dcs-5030l-remote-code-execution-cve-2017-17020/

Trust: 1.0

sources: EXPLOIT-DB: 44580

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 44580

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 44580

TYPE

Remote Code Execution (PoC)

Trust: 1.6

sources: EXPLOIT-DB: 44580 // EDBNET: 97724

CREDITS

Fidus InfoSecurity

Trust: 0.6

sources: EXPLOIT-DB: 44580

EXTERNAL IDS

db:NVDid:CVE-2017-17020

Trust: 1.6

db:EXPLOIT-DBid:44580

Trust: 1.6

db:EDBNETid:97724

Trust: 0.6

sources: EXPLOIT-DB: 44580 // EDBNET: 97724

REFERENCES

url:https://www.fidusinfosec.com/dlink-dcs-5030l-remote-code-execution-cve-2017-17020/

Trust: 1.0

url:https://www.exploit-db.com/exploits/44580/

Trust: 0.6

sources: EXPLOIT-DB: 44580 // EDBNET: 97724

SOURCES

db:EXPLOIT-DBid:44580
db:EDBNETid:97724

LAST UPDATE DATE

2022-07-27T09:15:04.605000+00:00


SOURCES RELEASE DATE

db:EXPLOIT-DBid:44580date:2018-03-27T00:00:00
db:EDBNETid:97724date:2018-05-03T00:00:00