D-Link EyeOn Baby Monitor(DCS-825L)命令注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1274872 漏洞类型 缓冲区错误
发布时间 2018-08-24 更新时间 2019-10-23
CVE编号 CVE-2017-11564 CNNVD-ID CNNVD-201707-1031
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2018080171
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201707-1031
|漏洞详情
D-Link EyeOn Baby Monitor(DCS-825L)是友讯(D-Link)公司的一款婴儿监视器产品。 D-Link EyeOn Baby Monitor(DCS-825L)1.08.1版本中的Web服务框架存在命令注入漏洞。攻击者可通过伪造恶意的HTTP请求利用该漏洞执行命令。
|漏洞EXP
Reserved CVE: CVE-2017-11564

# Description 
The D-Link EyeOn Baby Monitor (DCS-825L) has multiple command injection vulnerabilities in the web service framework. An attacker can send a crafted request to execute commands; authentication is required before executing the attack.

# Vulnerability Type 
Command Injection

# Affected Product Code Base
DCS-825L EyeOn Baby Monitor - 1.08.1

# Affected Component
web service framework

# Attack Type
Remote

------------------------------------------
# Attack Vectors
Send a crafted HTTP request

# Discoverer
Dove Chiu (Trend Micro)
 
# Vulnerability Detail 
We found that parts of the web framework are written in shell scripts. Additionally, upon reviewing the files, we found that parts of the variables can be controlled from user input.
An attacker can forge malicious HTTP requests to execute commands on the device. Fortunately, the web server uses basic authentication first, before anyone can access any webpage

Reference: https://documents.trendmicro.com/assets/tech_brief_Device_Vulnerabilities_in_the_Connected_Home2.pdf

# Status
Fixed in the latest beta firmware


TREND MICRO EMAIL NOTICE
The information contained in this email and any attachments is confidential 
and may be subject to copyright or other intellectual property protection. 
If you are not the intended recipient, you are not authorized to use or 
disclose this information, and we request that you notify us by reply mail or
telephone and delete the original message from your mail system.


|参考资料

来源:seclists.org

链接:http://seclists.org/fulldisclosure/2018/Aug/19


来源:documents.trendmicro.com

链接:https://documents.trendmicro.com/assets/tech_brief_Device_Vulnerabilities_in_the_Connected_Home2.pdf