HIGH · 8.8

CVE-2020-25757

A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with ro...

Vulnerability Description

A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
DlinkDsr-150 Firmware<= 3.17
DlinkDsr-150-
DlinkDsr-150N Firmware<= 3.17
DlinkDsr-150N-
DlinkDsr-250 Firmware<= 3.17
DlinkDsr-250-
DlinkDsr-250N Firmware<= 3.17
DlinkDsr-250N-
DlinkDsr-500 Firmware<= 3.17
DlinkDsr-500-
DlinkDsr-500N FirmwareAll versions
DlinkDsr-500N-
DlinkDsr-500Ac Firmware<= 3.17
DlinkDsr-500Ac-
DlinkDsr-1000 Firmware<= 3.17
DlinkDsr-1000-
DlinkDsr-1000N Firmware<= 3.17
DlinkDsr-1000N-
DlinkDsr-1000Ac Firmware<= 3.17
DlinkDsr-1000Ac-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-25757?

CVE-2020-25757 is a vulnerability with a CVSS score of 8.8 (HIGH). A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with ro...

How severe is CVE-2020-25757?

CVE-2020-25757 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-25757?

Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dsr-150 Firmware, Dlink Dsr-150, Dlink Dsr-150N Firmware, Dlink Dsr-150N, Dlink Dsr-250 Firmware.