Lucene search

K
cveMitreCVE-2020-10215
HistoryMar 07, 2020 - 1:15 a.m.

CVE-2020-10215

2020-03-0701:15:15
CWE-78
mitre
web.nvd.nist.gov
149
cve-2020-10215
d-link dir-825
trendnet tew-632brp
remote code execution
dns_query.cgi
security vulnerability

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.003

Percentile

70.0%

An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the dns_query_name parameter in a dns_query.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.

Affected configurations

Nvd
Node
dlinkdir-825_firmwareMatch2.10
AND
dlinkdir-825Match-
Node
trendnettew-632brp_firmwareMatch1.010b32
AND
trendnettew-632brpMatch-
VendorProductVersionCPE
dlinkdir-825_firmware2.10cpe:2.3:o:dlink:dir-825_firmware:2.10:*:*:*:*:*:*:*
dlinkdir-825-cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*
trendnettew-632brp_firmware1.010b32cpe:2.3:o:trendnet:tew-632brp_firmware:1.010b32:*:*:*:*:*:*:*
trendnettew-632brp-cpe:2.3:h:trendnet:tew-632brp:-:*:*:*:*:*:*:*

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.003

Percentile

70.0%

Related for CVE-2020-10215