ID

VAR-201909-1438


CVE

CVE-2019-10892


TITLE

D-link DIR-806 Device buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-009048

DESCRIPTION

An issue was discovered in D-Link DIR-806 devices. There is a stack-based buffer overflow in function hnap_main at /htdocs/cgibin. The function will call sprintf without checking the length of strings in parameters given by HTTP header and can be controlled by users. And it finally leads to a stack-based buffer overflow via a special HTTP header. D-link DIR-806 The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Dlink DIR-806 is a wireless AC1200 dual-band router. An attacker could exploit this vulnerability to run Shellcode via a long HTTP header that starts with "SOAPAction: http://purenetworks.com/HNAP1/GetDeviceSettings/"

Trust: 2.25

sources: NVD: CVE-2019-10892 // JVNDB: JVNDB-2019-009048 // CNVD: CNVD-2019-39560 // VULHUB: VHN-142484

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-39560

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-806scope:eqversion:1.0

Trust: 1.0

vendor:d linkmodel:dir-806scope:eqversion:1.0

Trust: 0.8

vendor:d linkmodel:dir-806scope:eqversion:v1.0

Trust: 0.6

sources: CNVD: CNVD-2019-39560 // JVNDB: JVNDB-2019-009048 // NVD: CVE-2019-10892

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-10892
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-10892
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-39560
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201909-264
value: MEDIUM

Trust: 0.6

VULHUB: VHN-142484
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-10892
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-39560
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-142484
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-10892
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-39560 // VULHUB: VHN-142484 // JVNDB: JVNDB-2019-009048 // CNNVD: CNNVD-201909-264 // NVD: CVE-2019-10892

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-142484 // JVNDB: JVNDB-2019-009048 // NVD: CVE-2019-10892

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201909-264

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201909-264

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009048

PATCH

title:Top Pageurl:https://www.dlink.com/en/

Trust: 0.8

sources: JVNDB: JVNDB-2019-009048

EXTERNAL IDS

db:NVDid:CVE-2019-10892

Trust: 3.1

db:JVNDBid:JVNDB-2019-009048

Trust: 0.8

db:CNNVDid:CNNVD-201909-264

Trust: 0.7

db:CNVDid:CNVD-2019-39560

Trust: 0.6

db:NSFOCUSid:44331

Trust: 0.6

db:VULHUBid:VHN-142484

Trust: 0.1

sources: CNVD: CNVD-2019-39560 // VULHUB: VHN-142484 // JVNDB: JVNDB-2019-009048 // CNNVD: CNNVD-201909-264 // NVD: CVE-2019-10892

REFERENCES

url:https://github.com/kirin-say/vulnerabilities/blob/master/dir-806_stack_overflow_to_run_shellcode.md

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-10892

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10892

Trust: 0.8

url:http://www.nsfocus.net/vulndb/44331

Trust: 0.6

sources: CNVD: CNVD-2019-39560 // VULHUB: VHN-142484 // JVNDB: JVNDB-2019-009048 // CNNVD: CNNVD-201909-264 // NVD: CVE-2019-10892

SOURCES

db:CNVDid:CNVD-2019-39560
db:VULHUBid:VHN-142484
db:JVNDBid:JVNDB-2019-009048
db:CNNVDid:CNNVD-201909-264
db:NVDid:CVE-2019-10892

LAST UPDATE DATE

2024-11-23T22:33:45.150000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-39560date:2019-11-07T00:00:00
db:VULHUBid:VHN-142484date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2019-009048date:2019-09-11T00:00:00
db:CNNVDid:CNNVD-201909-264date:2020-09-02T00:00:00
db:NVDid:CVE-2019-10892date:2024-11-21T04:20:03.790

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-39560date:2019-11-07T00:00:00
db:VULHUBid:VHN-142484date:2019-09-06T00:00:00
db:JVNDBid:JVNDB-2019-009048date:2019-09-11T00:00:00
db:CNNVDid:CNNVD-201909-264date:2019-09-06T00:00:00
db:NVDid:CVE-2019-10892date:2019-09-06T20:15:11.067