Lucene search

K
cve[email protected]CVE-2013-5946
HistoryDec 19, 2013 - 4:24 a.m.

CVE-2013-5946

2013-12-1904:24:51
CWE-78
web.nvd.nist.gov
28
d-link
firmware
vulnerability
remote execution
cve-2013-5946

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.6%

The runShellCmd function in systemCheck.htm in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) “Ping or Trace an IP Address” or (2) “Perform a DNS Lookup” section.

Affected configurations

NVD
Node
dlinkdsr-500_firmwareRange1.08b51
OR
dlinkdsr-500_firmwareMatch1.02b11
OR
dlinkdsr-500_firmwareMatch1.02b25
OR
dlinkdsr-500_firmwareMatch1.03b12
OR
dlinkdsr-500_firmwareMatch1.03b23
OR
dlinkdsr-500_firmwareMatch1.03b27
OR
dlinkdsr-500_firmwareMatch1.03b36
OR
dlinkdsr-500_firmwareMatch1.03b43
OR
dlinkdsr-500_firmwareMatch1.04b58
OR
dlinkdsr-500_firmwareMatch1.06b43
OR
dlinkdsr-500_firmwareMatch1.06b53
AND
dlinkdsr-500Match-
Node
dlinkdsr-150n_firmwareRange1.05b48
AND
dlinkdsr-150nMatch-
Node
dlinkdsr-250n_firmwareRange1.08b39
OR
dlinkdsr-250n_firmwareMatch1.01b46
OR
dlinkdsr-250n_firmwareMatch1.01b56
OR
dlinkdsr-250n_firmwareMatch1.05b20
OR
dlinkdsr-250n_firmwareMatch1.05b53
OR
dlinkdsr-250n_firmwareMatch1.08b31
AND
dlinkdsr-250nMatch-
Node
dlinkdsr-1000_firmwareRange1.08b51
OR
dlinkdsr-1000_firmwareMatch1.01b50
OR
dlinkdsr-1000_firmwareMatch1.02b11
OR
dlinkdsr-1000_firmwareMatch1.02b25
OR
dlinkdsr-1000_firmwareMatch1.03b12
OR
dlinkdsr-1000_firmwareMatch1.03b23
OR
dlinkdsr-1000_firmwareMatch1.03b27
OR
dlinkdsr-1000_firmwareMatch1.03b36
OR
dlinkdsr-1000_firmwareMatch1.03b43
OR
dlinkdsr-1000_firmwareMatch1.04b58
OR
dlinkdsr-1000_firmwareMatch1.06b43
OR
dlinkdsr-1000_firmwareMatch1.06b53
AND
dlinkdsr-1000Match-
Node
dlinkdsr-150_firmwareRange1.08b29
OR
dlinkdsr-150_firmwareMatch1.05b29
OR
dlinkdsr-150_firmwareMatch1.05b35
OR
dlinkdsr-150_firmwareMatch1.05b46
OR
dlinkdsr-150_firmwareMatch1.05b50
AND
dlinkdsr-150Match-
Node
dlinkdsr-250_firmwareRange1.08b39
OR
dlinkdsr-250_firmwareMatch1.01b46
OR
dlinkdsr-250_firmwareMatch1.01b56
OR
dlinkdsr-250_firmwareMatch1.05b20
OR
dlinkdsr-250_firmwareMatch1.05b53
OR
dlinkdsr-250_firmwareMatch1.08b31
AND
dlinkdsr-250Match-
Node
dlinkdsr-1000n_firmwareRange1.08b51
OR
dlinkdsr-1000n_firmwareMatch1.01b50
OR
dlinkdsr-1000n_firmwareMatch1.02b11
OR
dlinkdsr-1000n_firmwareMatch1.02b25
OR
dlinkdsr-1000n_firmwareMatch1.03b12
OR
dlinkdsr-1000n_firmwareMatch1.03b23
OR
dlinkdsr-1000n_firmwareMatch1.03b27
OR
dlinkdsr-1000n_firmwareMatch1.03b36
OR
dlinkdsr-1000n_firmwareMatch1.03b43
OR
dlinkdsr-1000n_firmwareMatch1.04b58
OR
dlinkdsr-1000n_firmwareMatch1.06b43
OR
dlinkdsr-1000n_firmwareMatch1.06b53
AND
dlinkdsr-1000nMatch-
Node
dlinkdsr-500n_firmwareRange1.08b51
OR
dlinkdsr-500n_firmwareMatch1.02b11
OR
dlinkdsr-500n_firmwareMatch1.02b25
OR
dlinkdsr-500n_firmwareMatch1.03b12
OR
dlinkdsr-500n_firmwareMatch1.03b23
OR
dlinkdsr-500n_firmwareMatch1.03b27
OR
dlinkdsr-500n_firmwareMatch1.03b36
OR
dlinkdsr-500n_firmwareMatch1.03b43
OR
dlinkdsr-500n_firmwareMatch1.04b58
OR
dlinkdsr-500n_firmwareMatch1.06b43
OR
dlinkdsr-500n_firmwareMatch1.06b53
AND
dlinkdsr-500nMatch-

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.6%