First published: Tue Dec 15 2020(Updated: )
An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dsr-150 Firmware | <=3.17 | |
Dlink Dsr-150 | ||
Dlink Dsr-150n Firmware | <=3.17 | |
Dlink Dsr-150n | ||
Dlink Dsr-250 Firmware | <=3.17 | |
Dlink Dsr-250 | ||
Dlink Dsr-250n Firmware | <=3.17 | |
Dlink Dsr-250n | ||
Dlink Dsr-500 Firmware | <=3.17 | |
Dlink Dsr-500 | ||
Dlink Dsr-500n Firmware | ||
Dlink Dsr-500n | ||
<=3.17 | ||
Dlink Dsr-1000 Firmware | <=3.17 | |
Dlink Dsr-1000 | ||
Dlink Dsr-1000n Firmware | <=3.17 | |
Dlink Dsr-1000n | ||
<=3.17 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-25759.
The severity score of CVE-2020-25759 is 8.8 (Critical).
D-Link DSR-250 devices with firmware version up to 3.17 are affected.
An authenticated attacker can exploit CVE-2020-25759 by executing arbitrary commands through the web interface of the Unified Services Router.
Please refer to the official D-Link security bulletin (link provided) for available fixes and updates.