.. / CVE-2020-25506

Exploit for D-Link DNS-320 - Unauthenticated Remote Code Execution (CVE-2020-25506)

Description:

D-Link DNS-320 FW v2.06B01 Revision Ax is susceptible to a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution.

Nuclei Template

View the template here CVE-2020-25506.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-25506.yaml
Copy

References:

https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10183
https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/
https://www.dlink.com/en/security-bulletin/
https://nvd.nist.gov/vuln/detail/CVE-2020-25506
https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675