ID

VAR-202108-1937


CVE

CVE-2021-37388


TITLE

D-Link DIR-615 C2  Buffer Overflow Vulnerability in Linux

Trust: 0.8

sources: JVNDB: JVNDB-2021-009619

DESCRIPTION

A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution. D-Link DIR-615 C2 Contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DIR-615 is a wireless router made by D-Link in Taiwan. D-Link DIR-615 has a security vulnerability, which is caused by incorrectly verifying the data boundary when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow, etc

Trust: 2.25

sources: NVD: CVE-2021-37388 // JVNDB: JVNDB-2021-009619 // CNVD: CNVD-2021-94836 // VULMON: CVE-2021-37388

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-94836

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-615scope:eqversion:3.03ww

Trust: 1.0

vendor:d linkmodel:dir-615scope:eqversion: -

Trust: 0.8

vendor:d linkmodel:dir-615scope:eqversion:dir-615 firmware 3.03ww

Trust: 0.8

vendor:d linkmodel:dir-615 c2 3.03wwscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-94836 // JVNDB: JVNDB-2021-009619 // NVD: CVE-2021-37388

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-37388
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-37388
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2021-94836
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202108-675
value: CRITICAL

Trust: 0.6

VULMON: CVE-2021-37388
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-37388
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-94836
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-37388
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-37388
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-94836 // VULMON: CVE-2021-37388 // JVNDB: JVNDB-2021-009619 // CNNVD: CNNVD-202108-675 // NVD: CVE-2021-37388

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-009619 // NVD: CVE-2021-37388

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-675

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202108-675

PATCH

title:Security Bulletinurl:https://www.dlink.com/en/security-bulletin

Trust: 0.8

title:Patch for D-Link DIR-615 buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/302911

Trust: 0.6

title:D-Link DIR-615 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=158972

Trust: 0.6

sources: CNVD: CNVD-2021-94836 // JVNDB: JVNDB-2021-009619 // CNNVD: CNNVD-202108-675

EXTERNAL IDS

db:NVDid:CVE-2021-37388

Trust: 3.9

db:JVNDBid:JVNDB-2021-009619

Trust: 0.8

db:CNVDid:CNVD-2021-94836

Trust: 0.6

db:CNNVDid:CNNVD-202108-675

Trust: 0.6

db:VULMONid:CVE-2021-37388

Trust: 0.1

sources: CNVD: CNVD-2021-94836 // VULMON: CVE-2021-37388 // JVNDB: JVNDB-2021-009619 // CNNVD: CNNVD-202108-675 // NVD: CVE-2021-37388

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-37388

Trust: 2.0

url:https://www.dlink.com/en/security-bulletin/

Trust: 1.7

url:https://github.com/noobexploiter/iothacks/blob/main/vuln1.md

Trust: 1.7

url:https://cwe.mitre.org/data/definitions/120.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-94836 // VULMON: CVE-2021-37388 // JVNDB: JVNDB-2021-009619 // CNNVD: CNNVD-202108-675 // NVD: CVE-2021-37388

SOURCES

db:CNVDid:CNVD-2021-94836
db:VULMONid:CVE-2021-37388
db:JVNDBid:JVNDB-2021-009619
db:CNNVDid:CNNVD-202108-675
db:NVDid:CVE-2021-37388

LAST UPDATE DATE

2024-08-14T15:17:07.654000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-94836date:2021-12-07T00:00:00
db:VULMONid:CVE-2021-37388date:2021-08-13T00:00:00
db:JVNDBid:JVNDB-2021-009619date:2022-05-13T08:37:00
db:CNNVDid:CNNVD-202108-675date:2021-08-24T00:00:00
db:NVDid:CVE-2021-37388date:2021-08-13T18:00:58.260

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-94836date:2021-12-07T00:00:00
db:VULMONid:CVE-2021-37388date:2021-08-06T00:00:00
db:JVNDBid:JVNDB-2021-009619date:2022-05-13T00:00:00
db:CNNVDid:CNNVD-202108-675date:2021-08-06T00:00:00
db:NVDid:CVE-2021-37388date:2021-08-06T12:15:07.057