Vulnerability Description
SMC Networks D3G0804W D3GNV5M-3.5.1.6.10_GA devices allow remote command execution by leveraging access to the Network Diagnostic Tools screen, as demonstrated by an admin login. The attacker must use a Parameter Pollution approach against goform/formSetDiagnosticToolsFmPing by providing the vlu_diagnostic_tools__ping_address parameter twice: once with a shell metacharacter and a command name, and once with a command argument.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Smc | D3G0804W Firmware | d3gnv5m-3.5.1.6.10_ga |
| Smc | D3G0804W | - |
Related Weaknesses (CWE)
References
- https://sku11army.blogspot.com/2020/01/smc-networks-remote-code-execution.htmlExploitThird Party Advisory
- https://sku11army.blogspot.com/2020/01/smc-networks-remote-code-execution.htmlExploitThird Party Advisory
FAQ
What is CVE-2020-8087?
CVE-2020-8087 is a vulnerability with a CVSS score of 9.8 (CRITICAL). SMC Networks D3G0804W D3GNV5M-3.5.1.6.10_GA devices allow remote command execution by leveraging access to the Network Diagnostic Tools screen, as demonstrated by an admin login. The attacker must use...
How severe is CVE-2020-8087?
CVE-2020-8087 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-8087?
Check the references section above for vendor advisories and patch information. Affected products include: Smc D3G0804W Firmware, Smc D3G0804W.