ID

VAR-202012-1644


TITLE

(0Day) D-Link DCS-960L HNAP Cookie Format String Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-20-1435

DESCRIPTION

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of the Cookie request header. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to execute code in the context of the device.

Trust: 0.7

sources: ZDI: ZDI-20-1435

AFFECTED PRODUCTS

vendor:d linkmodel:dcs-960lscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-1435

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: ZDI-20-1435
value: HIGH

Trust: 0.7

ZDI: ZDI-20-1435
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-1435

EXTERNAL IDS

db:ZDI_CANid:ZDI-CAN-11360

Trust: 0.7

db:ZDIid:ZDI-20-1435

Trust: 0.7

sources: ZDI: ZDI-20-1435

CREDITS

phieulang aka Hoang Le of VietSunShine Cyber Security Services

Trust: 0.7

sources: ZDI: ZDI-20-1435

SOURCES

db:ZDIid:ZDI-20-1435

LAST UPDATE DATE

2022-05-17T01:50:51.503000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-1435date:2021-09-27T00:00:00

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-1435date:2020-12-15T00:00:00