First published: Sat Mar 07 2020(Updated: )
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-825 Firmware | =2.10 | |
Dlink Dir-825 | ||
Trendnet Tew-632brp Firmware | =1.010b32 | |
TRENDnet TEW-632BRP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-10215.
This vulnerability allows remote attackers to execute arbitrary commands on D-Link DIR-825 Rev.B 2.10 devices.
TRENDnet TEW-632BRP 1.010B32 devices are also affected by this vulnerability.
The severity of CVE-2020-10215 is critical, with a CVSS score of 8.8.
To fix the vulnerability in D-Link DIR-825 devices, it is recommended to apply the latest firmware update provided by D-Link.
To fix the vulnerability in TRENDnet TEW-632BRP devices, it is recommended to apply the latest firmware update provided by TRENDnet.
The Common Weakness Enumeration (CWE) number for this vulnerability is CWE-78.