CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.1%
The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to execute arbitrary code via the ping_addr parameter to ping.ccp.
Vendor | Product | Version | CPE |
---|---|---|---|
dlink | dir-626l_firmware | 1.04 | cpe:2.3:o:dlink:dir-626l_firmware:1.04:b04:*:*:*:*:*:* |
dlink | dir-626l | - | cpe:2.3:h:dlink:dir-626l:-:*:*:*:*:*:*:* |
dlink | dir-636l_firmware | 1.04 | cpe:2.3:o:dlink:dir-636l_firmware:1.04:*:*:*:*:*:*:* |
dlink | dir-636l | - | cpe:2.3:h:dlink:dir-636l:-:*:*:*:*:*:*:* |
dlink | dir-808l_firmware | 1.03 | cpe:2.3:o:dlink:dir-808l_firmware:1.03:b05:*:*:*:*:*:* |
dlink | dir-808l | - | cpe:2.3:h:dlink:dir-808l:-:*:*:*:*:*:*:* |
dlink | dir-810l_firmware | 1.01 | cpe:2.3:o:dlink:dir-810l_firmware:1.01:b04:*:*:*:*:*:* |
dlink | dir-810l | - | cpe:2.3:h:dlink:dir-810l:-:*:*:*:*:*:*:* |
dlink | dir-810l_firmware | 2.02 | cpe:2.3:o:dlink:dir-810l_firmware:2.02:b01:*:*:*:*:*:* |
dlink | dir-820l_firmware | 1.02 | cpe:2.3:o:dlink:dir-820l_firmware:1.02:b10:*:*:*:*:*:* |
packetstormsecurity.com/files/130607/D-Link-DIR636L-Remote-Command-Injection.html
packetstormsecurity.com/files/131465/D-Link-TRENDnet-NCC-Service-Command-Injection.html
seclists.org/fulldisclosure/2015/Mar/15
securityadvisories.dlink.com/security/publication.aspx?name=SAP10052
www.securityfocus.com/bid/72848
github.com/darkarnium/secpub/tree/master/Multivendor/ncc2
More
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.1%