vendor:
DCS-5030L
by:
Fidus Infosec
8.8
CVSS
HIGH
Command Injection
78
CWE
Product Name: DCS-5030L
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Yes
Related CWE: CVE-2017-17020
CPE: h:d-link:dcs-5030l
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Unknown
2017
D-Link DCS-5030L Remote Code Execution (CVE-2017-17020)
An attacker can escape the ‘sed’ command with a simple payload, such as ‘`touch a`’. Another example that fits is AdminID=a’`telnetd`’, which allows a user to login as “a”, which becomes the new root account.
Mitigation:
Ensure that all user input is validated and sanitized before being used in system calls.