ID

VAR-201709-0600


CVE

CVE-2017-14429


TITLE

D-Link DIR-850L Command injection vulnerability in device firmware

Trust: 0.8

sources: JVNDB: JVNDB-2017-008110

DESCRIPTION

The DHCP client on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allows unauthenticated remote code execution as root because /etc/services/INET/inet_ipv4.php mishandles shell metacharacters, affecting generated files such as WAN-1-udhcpc.sh. D-Link DIR-850L The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-850LREV.A and REV.B are both D-Link wireless router products. A security vulnerability exists in the DHCP client on the REV.B device using D-LinkDIR-850LREV.A and FW208WWb02 and previous versions of firmware using FW114WWb07_h2ab_beta1 and previous firmware. The vulnerability is due to the /etc/services/INET/inet_ipv4.php file. Handle shell metacharacters correctly. A remote attacker could exploit the vulnerability to execute code with root privileges

Trust: 2.34

sources: NVD: CVE-2017-14429 // JVNDB: JVNDB-2017-008110 // CNVD: CNVD-2017-31797 // VULHUB: VHN-105150 // VULMON: CVE-2017-14429

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-31797

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-850lscope:ltversion:fw114wwb07_h2ab

Trust: 1.0

vendor:dlinkmodel:dir-850lscope:eqversion:fw114wwb07_h2ab

Trust: 1.0

vendor:dlinkmodel:dir-850lscope:lteversion:fw208wwb02

Trust: 1.0

vendor:d linkmodel:dir-850lscope:lteversion:fw114wwb07_h2ab_beta1

Trust: 0.8

vendor:d linkmodel:dir-850lscope:lteversion:fw208wwb02

Trust: 0.8

vendor:d linkmodel:dir-850l rev.a <=fw114wwb07 h2ab beta1scope: - version: -

Trust: 0.6

vendor:d linkmodel:rev.b <=fw208wwb02scope: - version: -

Trust: 0.6

vendor:d linkmodel:dir-850lscope:eqversion:fw114wwb07_h2ab

Trust: 0.6

vendor:d linkmodel:dir-850lscope:eqversion:fw208wwb02

Trust: 0.6

sources: CNVD: CNVD-2017-31797 // JVNDB: JVNDB-2017-008110 // CNNVD: CNNVD-201709-566 // NVD: CVE-2017-14429

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14429
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-14429
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-31797
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201709-566
value: CRITICAL

Trust: 0.6

VULHUB: VHN-105150
value: HIGH

Trust: 0.1

VULMON: CVE-2017-14429
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14429
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-31797
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-105150
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14429
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2017-14429
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-31797 // VULHUB: VHN-105150 // VULMON: CVE-2017-14429 // JVNDB: JVNDB-2017-008110 // CNNVD: CNNVD-201709-566 // NVD: CVE-2017-14429

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-105150 // JVNDB: JVNDB-2017-008110 // NVD: CVE-2017-14429

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-566

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201709-566

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008110

PATCH

title:DIR-850Lurl:http://support.dlink.com/ProductInfo.aspx?m=DIR-850L

Trust: 0.8

title:D-Link DIR-850L REV.A and REV.B DHCP Repair measures for client security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100046

Trust: 0.6

sources: JVNDB: JVNDB-2017-008110 // CNNVD: CNNVD-201709-566

EXTERNAL IDS

db:NVDid:CVE-2017-14429

Trust: 3.2

db:JVNDBid:JVNDB-2017-008110

Trust: 0.8

db:CNNVDid:CNNVD-201709-566

Trust: 0.7

db:CNVDid:CNVD-2017-31797

Trust: 0.6

db:VULHUBid:VHN-105150

Trust: 0.1

db:VULMONid:CVE-2017-14429

Trust: 0.1

sources: CNVD: CNVD-2017-31797 // VULHUB: VHN-105150 // VULMON: CVE-2017-14429 // JVNDB: JVNDB-2017-008110 // CNNVD: CNNVD-201709-566 // NVD: CVE-2017-14429

REFERENCES

url:https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-14429

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14429

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2017-31797 // VULHUB: VHN-105150 // VULMON: CVE-2017-14429 // JVNDB: JVNDB-2017-008110 // CNNVD: CNNVD-201709-566 // NVD: CVE-2017-14429

SOURCES

db:CNVDid:CNVD-2017-31797
db:VULHUBid:VHN-105150
db:VULMONid:CVE-2017-14429
db:JVNDBid:JVNDB-2017-008110
db:CNNVDid:CNNVD-201709-566
db:NVDid:CVE-2017-14429

LAST UPDATE DATE

2024-11-23T22:17:48.775000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-31797date:2017-10-27T00:00:00
db:VULHUBid:VHN-105150date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-14429date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-008110date:2017-10-10T00:00:00
db:CNNVDid:CNNVD-201709-566date:2019-10-23T00:00:00
db:NVDid:CVE-2017-14429date:2024-11-21T03:12:46.567

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-31797date:2017-10-27T00:00:00
db:VULHUBid:VHN-105150date:2017-09-13T00:00:00
db:VULMONid:CVE-2017-14429date:2017-09-13T00:00:00
db:JVNDBid:JVNDB-2017-008110date:2017-10-10T00:00:00
db:CNNVDid:CNNVD-201709-566date:2017-09-19T00:00:00
db:NVDid:CVE-2017-14429date:2017-09-13T17:29:00.870