First published: Tue Dec 15 2020(Updated: )
A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSR-150 | <=3.17 | |
D-Link DSR-150 | ||
D-Link DSR-150N | <=3.17 | |
D-Link DSR-150N | ||
D-Link DSR-250 | <=3.17 | |
D-Link DSR-250 | ||
D-Link DSR-250N Firmware | <=3.17 | |
D-Link DSR-250N Firmware | ||
D-Link DSR-500 | <=3.17 | |
D-Link DSR-500 | ||
D-Link DSR-500N | ||
D-Link DSR-500N | ||
D-Link DSR-500AC | <=3.17 | |
D-Link DSR-500AC | ||
D-Link DSR-1000AC | <=3.17 | |
D-Link DSR-1000AC | ||
D-Link DSR-1000N | <=3.17 | |
D-Link DSR-1000N | ||
D-Link DSR-1000AC | <=3.17 | |
D-Link DSR-1000AC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25757 is a vulnerability that allows arbitrary command execution with root privileges on D-Link DSR VPN routers.
D-Link DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17 are affected.
CVE-2020-25757 has a severity rating of 8.8 (high).
CVE-2020-25757 can be exploited by passing arbitrary input to system command APIs in Lua CGIs.
To fix CVE-2020-25757, update the firmware of the affected D-Link DSR VPN routers to version 3.17 or newer.