ID

VAR-202012-1639


TITLE

(0Day) D-Link DCS-960L HNAP Login Cookie Format String Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-20-1436

DESCRIPTION

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of login action requests. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to execute code in the context of the device.

Trust: 0.7

sources: ZDI: ZDI-20-1436

AFFECTED PRODUCTS

vendor:d linkmodel:dcs-960lscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-1436

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-20-1436
value: HIGH

Trust: 0.7

ZDI: ZDI-20-1436
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-1436

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-11366

Trust: 0.7

db:ZDIid:ZDI-20-1436

Trust: 0.7

sources: ZDI: ZDI-20-1436

CREDITS

chung96vn of Vietnam's NCSC

Trust: 0.7

sources: ZDI: ZDI-20-1436

SOURCES

db:ZDIid:ZDI-20-1436

LAST UPDATE DATE

2022-05-17T01:43:03.634000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-1436date:2020-12-15T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-1436date:2020-12-15T00:00:00