ID

VAR-201312-0289


CVE

CVE-2013-7004


TITLE

plural D-Link Vulnerability to obtain access rights in router product firmware

Trust: 0.8

sources: JVNDB: JVNDB-2013-005615

DESCRIPTION

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username. plural D-Link Router product firmware is user name gkJ9232xXyruTRmY There is a vulnerability that can be obtained because it has a hard-coded account.An access right may be obtained by using the user name information by a third party. D-Link DSR is a wireless service router product developed by D-Link. D-Link DSR Router Series are prone to a security-bypass vulnerability. A trust management vulnerability exists in several D-Link products. The vulnerability stems from the fact that the program has a hard-coded user account named 'gkJ9232xXyruTRmY'. The following products and versions are affected: DSR-150 with firmware version 1.08B29 and earlier; DSR-150N with firmware version 1.05B51 and earlier; DSR-250 and DSR-250N with firmware version 1.08B39 and earlier; DSR-500, DSR-500N, DSR-1000, DSR-1000N with previous firmware versions

Trust: 2.52

sources: NVD: CVE-2013-7004 // JVNDB: JVNDB-2013-005615 // CNVD: CNVD-2013-15548 // BID: 64462 // VULHUB: VHN-67006

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-15548

AFFECTED PRODUCTS

vendor:dlinkmodel:dsr-150scope:lteversion:1.08b29

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.03b36

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.02b25

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.06b43

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.03b43

Trust: 1.0

vendor:dlinkmodel:dsr-250nscope:eqversion:1.08b31

Trust: 1.0

vendor:dlinkmodel:dsr-150nscope:lteversion:1.05b48

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.03b23

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.03b12

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion: -

Trust: 1.0

vendor:dlinkmodel:dsr-250scope:eqversion:1.05b53

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.03b23

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.02b11

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.04b58

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.03b27

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.03b27

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.04b58

Trust: 1.0

vendor:dlinkmodel:dsr-150scope:eqversion:1.05b50

Trust: 1.0

vendor:dlinkmodel:dsr-150nscope:eqversion: -

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.06b53

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.03b36

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.03b36

Trust: 1.0

vendor:dlinkmodel:dsr-250nscope:lteversion:1.08b39

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion: -

Trust: 1.0

vendor:dlinkmodel:dsr-250scope:eqversion:1.08b31

Trust: 1.0

vendor:dlinkmodel:dsr-250nscope:eqversion:1.01b46

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.02b25

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.03b43

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:lteversion:1.08b51

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.03b43

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion: -

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.03b12

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.06b43

Trust: 1.0

vendor:dlinkmodel:dsr-150scope:eqversion: -

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.01b50

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.06b43

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:lteversion:1.08b51

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.06b53

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.02b11

Trust: 1.0

vendor:dlinkmodel:dsr-250nscope:eqversion:1.01b56

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.02b11

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.03b23

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.04b58

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.06b53

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.06b53

Trust: 1.0

vendor:dlinkmodel:dsr-250scope:eqversion:1.01b46

Trust: 1.0

vendor:dlinkmodel:dsr-250nscope:eqversion:1.05b20

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.03b27

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.02b25

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.02b25

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:eqversion:1.03b12

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion:1.03b12

Trust: 1.0

vendor:dlinkmodel:dsr-150scope:eqversion:1.05b46

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.03b36

Trust: 1.0

vendor:dlinkmodel:dsr-150scope:eqversion:1.05b35

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.06b43

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.03b43

Trust: 1.0

vendor:dlinkmodel:dsr-250scope:lteversion:1.08b39

Trust: 1.0

vendor:dlinkmodel:dsr-1000scope:lteversion:1.08b51

Trust: 1.0

vendor:dlinkmodel:dsr-250scope:eqversion:1.01b56

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.03b23

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.01b50

Trust: 1.0

vendor:dlinkmodel:dsr-250nscope:eqversion:1.05b53

Trust: 1.0

vendor:dlinkmodel:dsr-250scope:eqversion: -

Trust: 1.0

vendor:dlinkmodel:dsr-150scope:eqversion:1.05b29

Trust: 1.0

vendor:dlinkmodel:dsr-250scope:eqversion:1.05b20

Trust: 1.0

vendor:dlinkmodel:dsr-1000nscope:eqversion:1.02b11

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.04b58

Trust: 1.0

vendor:dlinkmodel:dsr-500nscope:eqversion:1.03b27

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:lteversion:1.08b51

Trust: 1.0

vendor:dlinkmodel:dsr-500scope:eqversion: -

Trust: 1.0

vendor:d linkmodel:dsr-1000scope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-1000scope:ltversion:1.08b77

Trust: 0.8

vendor:d linkmodel:dsr-1000nscope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-1000nscope:ltversion:1.08b77

Trust: 0.8

vendor:d linkmodel:dsr-150scope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-150scope:ltversion:1.08b44

Trust: 0.8

vendor:d linkmodel:dsr-150nscope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-150nscope:ltversion:1.05b64

Trust: 0.8

vendor:d linkmodel:dsr-250scope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-250scope:ltversion:1.08b44

Trust: 0.8

vendor:d linkmodel:dsr-250nscope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-250nscope:ltversion:1.08b44

Trust: 0.8

vendor:d linkmodel:dsr-500scope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-500scope:ltversion:1.08b77

Trust: 0.8

vendor:d linkmodel:dsr-500nscope: - version: -

Trust: 0.8

vendor:d linkmodel:dsr-500nscope:ltversion:1.08b77

Trust: 0.8

vendor:d linkmodel:dsr-150 v1.08b44scope:ltversion: -

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.02b11

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.02b25

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.03b36

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.03b23

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.03b27

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.04b58

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.06b43

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.01b50

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.03b12

Trust: 0.6

vendor:d linkmodel:dsr-1000scope:eqversion:1.03b43

Trust: 0.6

vendor:d linkmodel:dsr-500nscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-500scope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-250nscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-250scope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-150nscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-150scope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-1000nscope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-1000scope:eqversion:0

Trust: 0.3

vendor:d linkmodel:dsr-500n 1.08b77scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dsr-500 1.08b77scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dsr-250n 1.08b44scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dsr-250 1.08b44scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dsr-150n 1.05b64scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dsr-150 1.08b44scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dsr-1000n 1.08b77scope:neversion: -

Trust: 0.3

vendor:d linkmodel:dsr-1000 1.08b77scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2013-15548 // BID: 64462 // JVNDB: JVNDB-2013-005615 // CNNVD: CNNVD-201312-400 // NVD: CVE-2013-7004

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-7004
value: HIGH

Trust: 1.0

NVD: CVE-2013-7004
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-15548
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201312-400
value: HIGH

Trust: 0.6

VULHUB: VHN-67006
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-7004
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-15548
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-67006
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-15548 // VULHUB: VHN-67006 // JVNDB: JVNDB-2013-005615 // CNNVD: CNNVD-201312-400 // NVD: CVE-2013-7004

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-67006 // JVNDB: JVNDB-2013-005615 // NVD: CVE-2013-7004

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201312-400

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201312-400

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005615

PATCH

title:Services Routersurl:http://www.dlink.com/us/en/business-solutions/security/services-routers

Trust: 0.8

title:ルータ/ファイアウォールurl:http://www.dlink-jp.com/router-firewall

Trust: 0.8

title:Downloadsurl:http://tsd.dlink.com.tw/

Trust: 0.8

title:D-Link DSR Router built-in account vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/41959

Trust: 0.6

title:DSR-250N_A1_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47082

Trust: 0.6

title:DSR-250_A1_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47081

Trust: 0.6

title:DSR-150N_A2_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47080

Trust: 0.6

title:DSR-150_A2_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47079

Trust: 0.6

title:DSR-150_A1_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47078

Trust: 0.6

title:DSR-1000_A1_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47085

Trust: 0.6

title:DSR-500N_A1_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47084

Trust: 0.6

title:DSR-500_A1_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47083

Trust: 0.6

title:DSR-1000N_A1_FW1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=47086

Trust: 0.6

sources: CNVD: CNVD-2013-15548 // JVNDB: JVNDB-2013-005615 // CNNVD: CNNVD-201312-400

EXTERNAL IDS

db:NVDid:CVE-2013-7004

Trust: 3.4

db:EXPLOIT-DBid:30061

Trust: 2.3

db:BIDid:64462

Trust: 1.0

db:JVNDBid:JVNDB-2013-005615

Trust: 0.8

db:CNNVDid:CNNVD-201312-400

Trust: 0.7

db:CNVDid:CNVD-2013-15548

Trust: 0.6

db:VULHUBid:VHN-67006

Trust: 0.1

sources: CNVD: CNVD-2013-15548 // VULHUB: VHN-67006 // BID: 64462 // JVNDB: JVNDB-2013-005615 // CNNVD: CNNVD-201312-400 // NVD: CVE-2013-7004

REFERENCES

url:http://www.exploit-db.com/exploits/30061

Trust: 2.3

url:http://tsd.dlink.com.tw/temp/pmd/12879/dsr-500_500n_1000_1000n_a1_release_notes_fw_v1.08b77_ww.pdf

Trust: 1.7

url:http://tsd.dlink.com.tw/temp/pmd/12960/dsr-150n_a2_release_notes_fw_v1.05b64_ww.pdf

Trust: 1.7

url:http://tsd.dlink.com.tw/temp/pmd/12966/dsr-150_a1_a2_release_notes_fw_v1.08b44_ww.pdf

Trust: 1.7

url:http://tsd.dlink.com.tw/temp/pmd/13039/dsr-250_250n_a1_a2_release_notes_fw_v1.08b44_ww_ru.pdf

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7004

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7004

Trust: 0.8

url:http://tsd.dlink.com.tw/

Trust: 0.3

url:http://www.dlink.com/

Trust: 0.3

sources: CNVD: CNVD-2013-15548 // VULHUB: VHN-67006 // BID: 64462 // JVNDB: JVNDB-2013-005615 // CNNVD: CNNVD-201312-400 // NVD: CVE-2013-7004

CREDITS

nu11.nu11

Trust: 0.3

sources: BID: 64462

SOURCES

db:CNVDid:CNVD-2013-15548
db:VULHUBid:VHN-67006
db:BIDid:64462
db:JVNDBid:JVNDB-2013-005615
db:CNNVDid:CNNVD-201312-400
db:NVDid:CVE-2013-7004

LAST UPDATE DATE

2025-04-11T23:03:51.916000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-15548date:2013-12-25T00:00:00
db:VULHUBid:VHN-67006date:2013-12-19T00:00:00
db:BIDid:64462date:2013-12-20T00:00:00
db:JVNDBid:JVNDB-2013-005615date:2013-12-20T00:00:00
db:CNNVDid:CNNVD-201312-400date:2023-04-27T00:00:00
db:NVDid:CVE-2013-7004date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-15548date:2013-12-25T00:00:00
db:VULHUBid:VHN-67006date:2013-12-19T00:00:00
db:BIDid:64462date:2013-12-20T00:00:00
db:JVNDBid:JVNDB-2013-005615date:2013-12-20T00:00:00
db:CNNVDid:CNNVD-201312-400date:2013-12-25T00:00:00
db:NVDid:CVE-2013-7004date:2013-12-19T04:24:57.463