目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2017-8413— D-Link DCS-1100和D-Link DCS-1130 命令注入漏洞

EPSS 1.76% · P83
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2017-8413 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device runs a custom daemon on UDP port 5978 which is called "dldps2121" and listens for broadcast packets sent on 255.255.255.255. This daemon handles custom D-Link UDP based protocol that allows D-Link mobile applications and desktop applications to discover D-Link devices on the local network. The binary processes the received UDP packets sent from any device in "main" function. One path in the function traverses towards a block of code that handles commands to be executed on the device. The custom protocol created by D-Link follows the following pattern: Packetlen, Type of packet; M=MAC address of device or broadcast; D=Device Type;C=base64 encoded command string;test=1111. If a packet is received with the packet type being "S" or 0x53 then the string passed in the "C" parameter is base64 decoded and then executed by passing into a System API. We can see at address 0x00009B44 that the string received in packet type subtracts 0x31 or "1" from the packet type and is compared against 0x22 or "double quotes". If that is the case, then the packet is sent towards the block of code that executes a command. Then the value stored in "C" parameter is extracted at address 0x0000A1B0. Finally, the string received is base 64 decoded and passed on to the system API at address 0x0000A2A8 as shown below. The same form of communication can be initiated by any process including an attacker process on the mobile phone or the desktop and this allows a third-party application on the device to execute commands on the device without any authentication by sending just 1 UDP packet with custom base64 encoding.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
D-Link DCS-1100和D-Link DCS-1130 命令注入漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
D-Link DCS-1100和D-Link DCS-1130都是中国台湾友讯(D-Link)公司的一款网络摄像机。 D-Link DCS-1100和DCS-1130设备中存在安全漏洞。本地攻击者可利用该漏洞未经身份验证执行命令。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
-n/a n/a -

二、漏洞 CVE-2017-8413 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2017-8413 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · n/a · 2019-07-02 · 共 54 条

CVE-2019-7266Nortek Security & Control Linear eMerge 50P/5000P 授权问题漏洞
CVE-2019-13148TRENDnet TEW-827DRU 命令注入漏洞
CVE-2019-13153TRENDnet TEW-827DRU 命令操作系统命令注入漏洞
CVE-2019-13150TRENDnet TEW-827DRU 命令注入漏洞
CVE-2019-13151TRENDnet TEW-827DRU 命令操作系统命令注入漏洞
CVE-2019-13152TRENDnet TEW-827DRU 命令注入漏洞
CVE-2019-13149TRENDnet TEW-827DRU 命令操作系统命令注入漏洞
CVE-2019-7269Nortek Security & Control Linear eMerge 50P/5000P 操作系统命令注入漏洞
CVE-2019-7268Nortek Security & Control Linear eMerge 50P/5000P 代码问题漏洞
CVE-2019-7267Nortek Security & Control Linear eMerge 50P/5000P 路径遍历漏洞
CVE-2019-7270Nortek Security & Control Linear eMerge 50P/5000P 跨站请求伪造漏洞
CVE-2019-7265Nortek Security&Control Linear eMerge E3-Series 信任管理问题漏洞
CVE-2019-7264Nortek Security&Control Linear eMerge E3-Series 缓冲区错误漏洞
CVE-2019-7263Nortek Security&Control Linear eMerge E3-Series 代码问题漏洞
CVE-2019-7262Nortek Security&Control Linear eMerge E3-Series 跨站请求伪造漏洞
CVE-2019-7261Nortek Security&Control Linear eMerge E3-Series 信任管理问题漏洞
CVE-2019-7260Nortek Security&Control Linear eMerge E3-Series 信任管理问题漏洞
CVE-2019-7259Nortek Security&Control Linear eMerge E3-Series 信息泄露漏洞
CVE-2019-7258Nortek Security&Control Linear eMerge E3-Series 权限许可和访问控制问题漏洞
CVE-2019-7257Nortek Security&Control Linear eMerge E3-Series 代码问题漏洞

显示前 20 条,共 54 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-8413

暂无评论


发表评论