First published: Tue Dec 15 2020(Updated: )
A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dsr-150 Firmware | <=3.17 | |
Dlink Dsr-150 | ||
Dlink Dsr-150n Firmware | <=3.17 | |
Dlink Dsr-150n | ||
Dlink Dsr-250 Firmware | <=3.17 | |
Dlink Dsr-250 | ||
Dlink Dsr-250n Firmware | <=3.17 | |
Dlink Dsr-250n | ||
Dlink Dsr-500 Firmware | <=3.17 | |
Dlink Dsr-500 | ||
Dlink Dsr-500n Firmware | ||
Dlink Dsr-500n | ||
<=3.17 | ||
Dlink Dsr-1000 Firmware | <=3.17 | |
Dlink Dsr-1000 | ||
Dlink Dsr-1000n Firmware | <=3.17 | |
Dlink Dsr-1000n | ||
<=3.17 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25757 is a vulnerability that allows arbitrary command execution with root privileges on D-Link DSR VPN routers.
D-Link DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17 are affected.
CVE-2020-25757 has a severity rating of 8.8 (high).
CVE-2020-25757 can be exploited by passing arbitrary input to system command APIs in Lua CGIs.
To fix CVE-2020-25757, update the firmware of the affected D-Link DSR VPN routers to version 3.17 or newer.