ID

VAR-202104-1034


CVE

CVE-2021-27248


TITLE

D-Link DAP-2020 webproc getpage Stack-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-21-203

DESCRIPTION

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 v1.01rc001 Wi-Fi access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of CGI scripts. When parsing the getpage parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10932. D-Link DAP-2020 is a WiFi range extender from D-Link in Taiwan. TCP (Transmission Control Protocol, Transmission Control Protocol) is a connection-oriented, reliable, byte stream-based transport layer communication protocol, defined by IETF RFC 793

Trust: 2.16

sources: NVD: CVE-2021-27248 // ZDI: ZDI-21-203 // CNVD: CNVD-2021-40324 // VULMON: CVE-2021-27248

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['network device']sub_category:access point

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2021-40324

AFFECTED PRODUCTS

vendor:dlinkmodel:dap-2020scope:eqversion:1.01

Trust: 1.0

vendor:d linkmodel:dap-2020scope: - version: -

Trust: 0.7

vendor:d linkmodel:dap-2020 v1.01rc001scope: - version: -

Trust: 0.6

sources: ZDI: ZDI-21-203 // CNVD: CNVD-2021-40324 // NVD: CVE-2021-27248

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27248
value: HIGH

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2021-27248
value: HIGH

Trust: 1.0

ZDI: CVE-2021-27248
value: HIGH

Trust: 0.7

CNVD: CNVD-2021-40324
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-1143
value: HIGH

Trust: 0.6

VULMON: CVE-2021-27248
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-27248
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2021-40324
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-27248
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2021-27248
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

ZDI: CVE-2021-27248
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-203 // CNVD: CNVD-2021-40324 // VULMON: CVE-2021-27248 // CNNVD: CNNVD-202104-1143 // NVD: CVE-2021-27248 // NVD: CVE-2021-27248

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2021-27248

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202104-1143

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-1143

PATCH

title:D-Link has issued an update to correct this vulnerability.url:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10201

Trust: 0.7

title:Patch for D-Link DAP-2020 command injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/270746

Trust: 0.6

title:D-Link DAP-2020 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147505

Trust: 0.6

title:alonzzzourl:https://github.com/Alonzozzz/alonzzzo

Trust: 0.1

title: - url:https://github.com/khulnasoft-lab/awesome-security

Trust: 0.1

sources: ZDI: ZDI-21-203 // CNVD: CNVD-2021-40324 // VULMON: CVE-2021-27248 // CNNVD: CNNVD-202104-1143

EXTERNAL IDS

db:NVDid:CVE-2021-27248

Trust: 3.1

db:ZDIid:ZDI-21-203

Trust: 2.4

db:DLINKid:SAP10201

Trust: 1.7

db:ZDI_CANid:ZDI-CAN-10932

Trust: 0.7

db:CNVDid:CNVD-2021-40324

Trust: 0.6

db:CS-HELPid:SB2021100105

Trust: 0.6

db:CNNVDid:CNNVD-202104-1143

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULMONid:CVE-2021-27248

Trust: 0.1

sources: OTHER: None // ZDI: ZDI-21-203 // CNVD: CNVD-2021-40324 // VULMON: CVE-2021-27248 // CNNVD: CNNVD-202104-1143 // NVD: CVE-2021-27248

REFERENCES

url:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=sap10201

Trust: 2.4

url:https://www.zerodayinitiative.com/advisories/zdi-21-203/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-27248

Trust: 1.2

url:https://www.cybersecurity-help.cz/vdb/sb2021100105

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/121.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: OTHER: None // ZDI: ZDI-21-203 // CNVD: CNVD-2021-40324 // VULMON: CVE-2021-27248 // CNNVD: CNNVD-202104-1143 // NVD: CVE-2021-27248

CREDITS

chung96vn ft Hoang Le (phieulang)

Trust: 0.7

sources: ZDI: ZDI-21-203

SOURCES

db:OTHERid: -
db:ZDIid:ZDI-21-203
db:CNVDid:CNVD-2021-40324
db:VULMONid:CVE-2021-27248
db:CNNVDid:CNNVD-202104-1143
db:NVDid:CVE-2021-27248

LAST UPDATE DATE

2025-01-30T21:03:58.421000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-203date:2021-09-27T00:00:00
db:CNVDid:CNVD-2021-40324date:2021-06-08T00:00:00
db:VULMONid:CVE-2021-27248date:2023-04-26T00:00:00
db:CNNVDid:CNNVD-202104-1143date:2021-10-08T00:00:00
db:NVDid:CVE-2021-27248date:2024-11-21T05:57:40.923

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-203date:2021-02-24T00:00:00
db:CNVDid:CNVD-2021-40324date:2021-06-08T00:00:00
db:VULMONid:CVE-2021-27248date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202104-1143date:2021-04-14T00:00:00
db:NVDid:CVE-2021-27248date:2021-04-14T16:15:13.360