Product:

Dsr\-500ac_firmware

(Dlink)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2020-12-15 CVE-2020-25757 A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17. Dsr\-1000_firmware, Dsr\-1000ac_firmware, Dsr\-1000n_firmware, Dsr\-150_firmware, Dsr\-150n_firmware, Dsr\-250_firmware, Dsr\-250n_firmware, Dsr\-500_firmware, Dsr\-500ac_firmware, Dsr\-500n_firmware 8.8
2020-12-15 CVE-2020-25759 An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests. Dsr\-1000_firmware, Dsr\-1000ac_firmware, Dsr\-1000n_firmware, Dsr\-150_firmware, Dsr\-150n_firmware, Dsr\-250_firmware, Dsr\-250n_firmware, Dsr\-500_firmware, Dsr\-500ac_firmware, Dsr\-500n_firmware 8.8
2020-12-15 CVE-2020-25758 An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root. Dsr\-1000_firmware, Dsr\-1000ac_firmware, Dsr\-1000n_firmware, Dsr\-150_firmware, Dsr\-150n_firmware, Dsr\-250_firmware, Dsr\-250n_firmware, Dsr\-500_firmware, Dsr\-500ac_firmware, Dsr\-500n_firmware 8.8