Published:2021/04/09 Last Updated:2021/04/09
JVNVU#92898656
D-Link DAP-1880AC contains multiple vulnerabilities
Overview
DAP-1880AC provided by D-Link Japan K.K. contains multiple vulnerabilities.
Products Affected
- DAP-1880AC firmware version 1.21 and prior
Description
DAP-1880AC provided by D-Link Japan K.K. contains multiple vulnerabilities listed below.
- Improper access control (CWE-284) - CVE-2021-20694
CVSS v3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L Base Score: 5.0 - Improper privilege management (CWE-296) - CVE-2021-20695
CVSS v3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score: 8.8 - OS command injection (CWE-78) - CVE-2021-20696
-
CVSS v3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Base Score: 6.3 - Missing authentication for critical function (CWE-306) - CVE-2021-20697
CVSS v3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Base Score: 7.3
Impact
- An authenticated remote attacker can start telnet service. - CVE-2021-20694
- A low-privileged remote attacker can gain root privileges. - CVE-2021-20695
- If an authenticated remote attacker can send a specially crafted request to a specific CGI program, it may lead to an arbitrary OS command injection. - CVE-2021-20696
- A remote attacker can login to the product as a low-privileged user without the access privilege. - CVE-2021-20697
Solution
Update firmware
Update firmware to the latest version according to the information provided by the developer.
The developer has released the fixed version 1.23.
Vendor Status
Vendor | Link |
D-Link Japan K.K. | JVNVU#92898656 「DAP-1880AC脆弱性」に関するご報告 (in Japanese) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Chuya Hayakawa of 00One, Inc. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2021-20694 |
CVE-2021-20695 |
|
CVE-2021-20696 |
|
CVE-2021-20697 |
|
JVN iPedia |
|