On D-Link DCS-5009 devices with firmware 1.08.11 and earlier, DCS-5010 devices with firmware 1.14.09 and earlier, and DCS-5020L devices with firmware before 1.15.01, command injection in alphapd (binary responsible for running the camera's web server) allows remote authenticated attackers to execute code through sanitized /setSystemAdmin user input in the AdminID field being passed directly to a call to system.
References
Link | Resource |
---|---|
http://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10084 | Vendor Advisory |
https://www.fidusinfosec.com/dlink-dcs-5030l-remote-code-execution-cve-2017-17020/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2018-05-01 16:29
Updated : 2024-02-28 16:25
NVD link : CVE-2017-17020
Mitre link : CVE-2017-17020
CVE.ORG link : CVE-2017-17020
JSON object : View
Products Affected
dlink
- dcs-5020l_firmware
- dcs-5009_firmware
- dcs-5009
- dcs-5010
- dcs-5010_firmware
- dcs-5020l
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')