Published:2021/08/16  Last Updated:2021/08/16

JVNVU#92088210
Multiple vulnerabilities in D-Link router DSL-2750U

Overview

D-Link router DSL-2750U is vulnerable to unauthorized configuration modification and OS command injection.

Products Affected

  • D-Link DSL-2750U, with firmware vME1.16 or prior versions

Description

D-Link router DSL-2750U is vulnerable to unauthorized configuration modification (CWE-15, CVE-2021-3707) and OS command injection (CWE-78, CVE-2021-3708).

Impact

An unauthenticated attacker on the local network may execute any OS commands on the vulnerable device.

Solution

Update Firmware
Apply the appropriate firmware upgrade according to the information provided by D-Link.

D-Link released the fixed firmware vME_1.22.

References

  1. GitHub / HadiMed / firmware-analysis
    DSL-2750U (firmware version 1.6)

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score: 8.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:A/AC:L/Au:N/C:C/I:C/A:C
Base Score: 8.3
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Comment

This CVSS score reflects CVE-2021-3707.

Credit

Mohammed Hadi reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2021-3707
CVE-2021-3708
JVN iPedia