ID

VAR-202108-1038


CVE

CVE-2021-28839


TITLE

plural  D-Link DAP  In the product  NULL  Pointer dereference vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-010920

DESCRIPTION

Null Pointer Dereference vulnerability exists in D-Link DAP-2310 2.07.RC031, DAP-2330 1.07.RC028, DAP-2360 2.07.RC043, DAP-2553 3.06.RC027, DAP-2660 1.13.RC074, DAP-2690 3.16.RC100, DAP-2695 1.17.RC063, DAP-3320 1.01.RC014 and DAP-3662 1.01.RC022 in the upload_certificate function of sbin/httpd binary. When the binary handle the specific HTTP GET request, the strrchr in the upload_certificate function would take NULL as first argument, and incur the NULL pointer dereference vulnerability. plural D-Link DAP The product has NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be put into a state. D-Link DAP-2310 is a single-band wireless network access point, suitable for small businesses or schools that require fast and reliable wireless networks. D-Link DAP-2330 is a wireless N300 single frequency PoE access point. Attackers can use vulnerabilities to cause the program to crash

Trust: 2.25

sources: NVD: CVE-2021-28839 // JVNDB: JVNDB-2021-010920 // CNVD: CNVD-2021-94841 // VULMON: CVE-2021-28839

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-94841

AFFECTED PRODUCTS

vendor:dlinkmodel:dap-2360scope:eqversion:2.07.rc043

Trust: 1.0

vendor:dlinkmodel:dap-2690scope:eqversion:3.16.rc100

Trust: 1.0

vendor:dlinkmodel:dap-2553scope:eqversion:3.06.rc027

Trust: 1.0

vendor:dlinkmodel:dap-2330scope:eqversion:1.07.rc028

Trust: 1.0

vendor:dlinkmodel:dap-2310scope:eqversion:2.0.7.rc031

Trust: 1.0

vendor:dlinkmodel:dap-3320scope:eqversion:1.01.rc014

Trust: 1.0

vendor:dlinkmodel:dap-2660scope:eqversion:1.13.rc074

Trust: 1.0

vendor:dlinkmodel:dap-3662scope:eqversion:1.01.rc022

Trust: 1.0

vendor:dlinkmodel:dap-2695scope:eqversion:1.17.rc063

Trust: 1.0

vendor:d linkmodel:dap-2330scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-2360scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-3320scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-2690scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-3662scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-2695scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-2310scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-2553scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-2660scope: - version: -

Trust: 0.8

vendor:d linkmodel:dap-2310 2.07.rc031scope: - version: -

Trust: 0.6

vendor:d linkmodel:dap-2330 1.07.rc028scope: - version: -

Trust: 0.6

vendor:d linkmodel:dap-2360 2.07.rc043scope: - version: -

Trust: 0.6

vendor:d linkmodel:dap-2553 3.06.rc027scope: - version: -

Trust: 0.6

vendor:d linkmodel:dap-2660 rap-1.76.rc031scope: - version: -

Trust: 0.6

vendor:d linkmodel:dap-2660 rcap-1.46.103.13scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-94841 // JVNDB: JVNDB-2021-010920 // NVD: CVE-2021-28839

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-28839
value: HIGH

Trust: 1.0

NVD: CVE-2021-28839
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-94841
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202108-998
value: HIGH

Trust: 0.6

VULMON: CVE-2021-28839
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-28839
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-94841
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-28839
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-28839
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-94841 // VULMON: CVE-2021-28839 // JVNDB: JVNDB-2021-010920 // CNNVD: CNNVD-202108-998 // NVD: CVE-2021-28839

PROBLEMTYPE DATA

problemtype:CWE-476

Trust: 1.0

problemtype:NULL Pointer dereference (CWE-476) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-010920 // NVD: CVE-2021-28839

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-998

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202108-998

PATCH

title:Security Bulletinurl:https://www.dlink.com/en/security-bulletin

Trust: 0.8

sources: JVNDB: JVNDB-2021-010920

EXTERNAL IDS

db:NVDid:CVE-2021-28839

Trust: 3.9

db:JVNDBid:JVNDB-2021-010920

Trust: 0.8

db:CNVDid:CNVD-2021-94841

Trust: 0.6

db:CNNVDid:CNNVD-202108-998

Trust: 0.6

db:VULMONid:CVE-2021-28839

Trust: 0.1

sources: CNVD: CNVD-2021-94841 // VULMON: CVE-2021-28839 // JVNDB: JVNDB-2021-010920 // CNNVD: CNNVD-202108-998 // NVD: CVE-2021-28839

REFERENCES

url:https://github.com/zyw-200/equafl/blob/main/dlink-email-cve.pdf

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-28839

Trust: 2.0

url:https://www.dlink.com/en/security-bulletin/

Trust: 1.7

url:https://github.com/zyw-200/equafl/blob/main/dlink-email-cve2.pdf

Trust: 1.7

url:https://cwe.mitre.org/data/definitions/476.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-94841 // VULMON: CVE-2021-28839 // JVNDB: JVNDB-2021-010920 // CNNVD: CNNVD-202108-998 // NVD: CVE-2021-28839

SOURCES

db:CNVDid:CNVD-2021-94841
db:VULMONid:CVE-2021-28839
db:JVNDBid:JVNDB-2021-010920
db:CNNVDid:CNNVD-202108-998
db:NVDid:CVE-2021-28839

LAST UPDATE DATE

2024-08-14T14:25:16.032000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-94841date:2021-12-07T00:00:00
db:VULMONid:CVE-2021-28839date:2021-08-17T00:00:00
db:JVNDBid:JVNDB-2021-010920date:2022-07-12T03:05:00
db:CNNVDid:CNNVD-202108-998date:2021-08-24T00:00:00
db:NVDid:CVE-2021-28839date:2021-08-17T14:59:57.643

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-94841date:2021-12-07T00:00:00
db:VULMONid:CVE-2021-28839date:2021-08-10T00:00:00
db:JVNDBid:JVNDB-2021-010920date:2022-07-12T00:00:00
db:CNNVDid:CNNVD-202108-998date:2021-08-10T00:00:00
db:NVDid:CVE-2021-28839date:2021-08-10T18:15:07.180