ID

VAR-201901-1554


CVE

CVE-2018-20674


TITLE

plural D-Link Command injection vulnerability in product devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-013972

DESCRIPTION

plural D-Link Product devices contain a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-822C1 and others are all wireless router products of D-Link. A command execution vulnerability exists in several D-Link products that can be exploited by remote attackers to execute commands. D-Link DIR-822 C1, etc. The following products and versions are affected: D-Link DIR-822 C1 with firmware prior to v3.11B01Beta; DIR-822-US C1 with firmware prior to v3.11B01Beta; DIR-850L A with firmware prior to v1.21B08Beta *; DIR-850L B* with firmware prior to v2.22B03Beta; DIR-880L A* with firmware prior to v1.20B02Beta

Trust: 1.35

sources: JVNDB: JVNDB-2018-013972 // CNVD: CNVD-2019-01715 // VULHUB: VHN-131504

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-01715

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-822-usscope:lteversion:3.10b06

Trust: 1.0

vendor:dlinkmodel:dir-850lscope:lteversion:1.21b07

Trust: 1.0

vendor:dlinkmodel:dir-880lscope:eqversion:1.20b01

Trust: 1.0

vendor:dlinkmodel:dir-822scope:lteversion:3.10b06

Trust: 1.0

vendor:dlinkmodel:dir-880lscope:lteversion:1.07.b08

Trust: 1.0

vendor:dlinkmodel:dir-850lscope:eqversion:2.22b02

Trust: 1.0

vendor:dlinkmodel:dir-850lscope:lteversion:2.21b01

Trust: 1.0

vendor:d linkmodel:dir-822scope:ltversion:3.11b01beta

Trust: 0.8

vendor:d linkmodel:dir-822-usscope:ltversion:3.11b01beta

Trust: 0.8

vendor:d linkmodel:dir-850lscope:ltversion:1.21b08beta

Trust: 0.8

vendor:d linkmodel:dir-850lscope:ltversion:2.22b03beta

Trust: 0.8

vendor:d linkmodel:dir-880lscope:ltversion:1.20b02beta

Trust: 0.8

vendor:d linkmodel:dir-850l b* <v2.22b03betascope: - version: -

Trust: 0.6

vendor:d linkmodel:dir-822 c1 <v3.11b01betascope: - version: -

Trust: 0.6

vendor:d linkmodel:dir-822-us c1 <v3.11b01betascope: - version: -

Trust: 0.6

vendor:d linkmodel:dir-850l a* <v1.21b08betascope: - version: -

Trust: 0.6

vendor:d linkmodel:dir-880l a* <v1.20b02betascope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-01715 // JVNDB: JVNDB-2018-013972 // NVD: CVE-2018-20674

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-20674
value: HIGH

Trust: 1.0

NVD: CVE-2018-20674
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-01715
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201901-139
value: HIGH

Trust: 0.6

VULHUB: VHN-131504
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-20674
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-01715
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-131504
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-20674
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-01715 // VULHUB: VHN-131504 // JVNDB: JVNDB-2018-013972 // CNNVD: CNNVD-201901-139 // NVD: CVE-2018-20674

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-131504 // JVNDB: JVNDB-2018-013972 // NVD: CVE-2018-20674

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-139

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201901-139

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013972

PATCH

title:DIR-850L Rev. Ax/Bx, DIR-880L Rev.Ax, DIR-822 Rev. Cx :: Authenticated Command Bypass & Authenticated Remote Command Execution (RCE)url:https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10101

Trust: 0.8

title:Patches for multiple D-Link product command execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/150341

Trust: 0.6

title:Multiple D-Link Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88327

Trust: 0.6

sources: CNVD: CNVD-2019-01715 // JVNDB: JVNDB-2018-013972 // CNNVD: CNNVD-201901-139

EXTERNAL IDS

db:NVDid:CVE-2018-20674

Trust: 3.1

db:DLINKid:SAP10101

Trust: 2.3

db:JVNDBid:JVNDB-2018-013972

Trust: 0.8

db:CNNVDid:CNNVD-201901-139

Trust: 0.7

db:CNVDid:CNVD-2019-01715

Trust: 0.6

db:VULHUBid:VHN-131504

Trust: 0.1

sources: CNVD: CNVD-2019-01715 // VULHUB: VHN-131504 // JVNDB: JVNDB-2018-013972 // CNNVD: CNNVD-201901-139 // NVD: CVE-2018-20674

REFERENCES

url:https://securityadvisories.dlink.com/announcement/publication.aspx?name=sap10101

Trust: 2.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-20674

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-20674

Trust: 0.8

sources: CNVD: CNVD-2019-01715 // VULHUB: VHN-131504 // JVNDB: JVNDB-2018-013972 // CNNVD: CNNVD-201901-139 // NVD: CVE-2018-20674

SOURCES

db:CNVDid:CNVD-2019-01715
db:VULHUBid:VHN-131504
db:JVNDBid:JVNDB-2018-013972
db:CNNVDid:CNNVD-201901-139
db:NVDid:CVE-2018-20674

LAST UPDATE DATE

2024-11-23T21:37:43.235000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-01715date:2019-01-17T00:00:00
db:VULHUBid:VHN-131504date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2018-013972date:2019-03-07T00:00:00
db:CNNVDid:CNNVD-201901-139date:2019-10-23T00:00:00
db:NVDid:CVE-2018-20674date:2024-11-21T04:01:58.123

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-01715date:2019-01-17T00:00:00
db:VULHUBid:VHN-131504date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2018-013972date:2019-03-07T00:00:00
db:CNNVDid:CNNVD-201901-139date:2019-01-09T00:00:00
db:NVDid:CVE-2018-20674date:2019-01-09T00:29:00.210