ID

VAR-202102-0333


CVE

CVE-2020-27862


TITLE

D-Link DVA-2800  and  DSL-2888A  Command injection vulnerability in router

Trust: 0.8

sources: JVNDB: JVNDB-2020-015977

DESCRIPTION

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dhttpd service, which listens on TCP port 8008 by default. When parsing the path parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-10911. D-Link DVA-2800 and DSL-2888A A command injection vulnerability exists in the router. Zero Day Initiative To this vulnerability ZDI-CAN-10911 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-link DSL-2888A is a unified service router of China D-link Corporation. The vulnerability stems from the fact that the network system or product does not properly filter special elements in the process of constructing executable commands from external input data

Trust: 2.79

sources: NVD: CVE-2020-27862 // JVNDB: JVNDB-2020-015977 // ZDI: ZDI-20-1426 // CNVD: CNVD-2021-14791

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-14791

AFFECTED PRODUCTS

vendor:d linkmodel:dva-2800scope: - version: -

Trust: 1.4

vendor:d linkmodel:dsl-2888ascope: - version: -

Trust: 1.4

vendor:dlinkmodel:dsl-2888ascope:eqversion:2.30_au

Trust: 1.0

vendor:dlinkmodel:dva-2800scope:eqversion:2.30_au

Trust: 1.0

vendor:d linkmodel:multiple routersscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-1426 // CNVD: CNVD-2021-14791 // JVNDB: JVNDB-2020-015977 // NVD: CVE-2020-27862

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-27862
value: HIGH

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2020-27862
value: HIGH

Trust: 1.0

NVD: CVE-2020-27862
value: HIGH

Trust: 0.8

ZDI: CVE-2020-27862
value: HIGH

Trust: 0.7

CNVD: CNVD-2021-14791
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202102-1080
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-27862
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2021-14791
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2020-27862
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2020-27862
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2020-27862
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-1426 // CNVD: CNVD-2021-14791 // JVNDB: JVNDB-2020-015977 // CNNVD: CNNVD-202102-1080 // NVD: CVE-2020-27862 // NVD: CVE-2020-27862

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015977 // NVD: CVE-2020-27862

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202102-1080

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202102-1080

PATCH

title:dhttpd Authentication Bypass Vulnerabilityurl:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10196

Trust: 1.5

title:Patch for DSL-2888A firmware command injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/251131

Trust: 0.6

title:DSL-2888A firmware Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142625

Trust: 0.6

sources: ZDI: ZDI-20-1426 // CNVD: CNVD-2021-14791 // JVNDB: JVNDB-2020-015977 // CNNVD: CNNVD-202102-1080

EXTERNAL IDS

db:NVDid:CVE-2020-27862

Trust: 3.7

db:ZDIid:ZDI-20-1426

Trust: 3.1

db:DLINKid:SAP10196

Trust: 1.6

db:JVNDBid:JVNDB-2020-015977

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-10911

Trust: 0.7

db:CNVDid:CNVD-2021-14791

Trust: 0.6

db:CNNVDid:CNNVD-202102-1080

Trust: 0.6

sources: ZDI: ZDI-20-1426 // CNVD: CNVD-2021-14791 // JVNDB: JVNDB-2020-015977 // CNNVD: CNNVD-202102-1080 // NVD: CVE-2020-27862

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-20-1426/

Trust: 2.4

url:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10196

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-27862

Trust: 2.0

sources: ZDI: ZDI-20-1426 // CNVD: CNVD-2021-14791 // JVNDB: JVNDB-2020-015977 // CNNVD: CNNVD-202102-1080 // NVD: CVE-2020-27862

CREDITS

chung96vn ft Hoang Le (phieulang)

Trust: 0.7

sources: ZDI: ZDI-20-1426

SOURCES

db:ZDIid:ZDI-20-1426
db:CNVDid:CNVD-2021-14791
db:JVNDBid:JVNDB-2020-015977
db:CNNVDid:CNNVD-202102-1080
db:NVDid:CVE-2020-27862

LAST UPDATE DATE

2024-11-23T22:20:53.022000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-1426date:2021-09-27T00:00:00
db:CNVDid:CNVD-2021-14791date:2021-03-07T00:00:00
db:JVNDBid:JVNDB-2020-015977date:2021-10-28T08:45:00
db:CNNVDid:CNNVD-202102-1080date:2021-03-19T00:00:00
db:NVDid:CVE-2020-27862date:2024-11-21T05:21:57.233

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-1426date:2020-12-15T00:00:00
db:CNVDid:CNVD-2021-14791date:2021-03-07T00:00:00
db:JVNDBid:JVNDB-2020-015977date:2021-10-28T00:00:00
db:CNNVDid:CNNVD-202102-1080date:2021-02-11T00:00:00
db:NVDid:CVE-2020-27862date:2021-02-12T00:15:12.577