D-Link Router HNAP GetDeviceSettings Remote Command Execution

critical Nessus Plugin ID 84086

Synopsis

The remote device is affected by a remote command execution vulnerability.

Description

The remote D-Link device is affected by a remote command execution vulnerability due to a flaw in the GetDeviceSettings functionality of the HNAP (Home Network Administration Protocol) server. A remote attacker can exploit this, via a crafted SOAPAction header, to bypass authentication and inject arbitrary commands.

Solution

Upgrade the firmware of the device to version 1.05b01.

See Also

http://www.nessus.org/u?659398bc

Plugin Details

Severity: Critical

ID: 84086

File Name: dlink_cve-2015-2051.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 6/10/2015

Updated: 4/25/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-2051

Vulnerability Information

CPE: cpe:/h:d-link:dir-645

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/24/2015

Vulnerability Publication Date: 2/13/2015

CISA Known Exploited Vulnerability Due Dates: 8/10/2022

Reference Information

CVE: CVE-2015-2051

BID: 74870