Vulnerability Details : CVE-2013-7005
Potential exploit
D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 stores account passwords in cleartext, which allows local users to obtain sensitive information by reading the Users[#]["Password"] fields in /tmp/teamf1.cfg.ascii.
Products affected by CVE-2013-7005
- cpe:2.3:o:dlink:dsr-250n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250n_firmware:1.01b46:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250n_firmware:1.01b56:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250n_firmware:1.05b20:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250n_firmware:1.05b53:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250n_firmware:1.08b31:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-150_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-150_firmware:1.05b29:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-150_firmware:1.05b35:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-150_firmware:1.05b46:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-150_firmware:1.05b50:*:*:*:*:*:*:*
- cpe:2.3:h:dlink:dsr-150:-:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-150n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:h:dlink:dsr-150n:-:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250_firmware:1.01b46:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250_firmware:1.01b56:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250_firmware:1.05b20:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250_firmware:1.05b53:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-250_firmware:1.08b31:*:*:*:*:*:*:*
- cpe:2.3:h:dlink:dsr-250:-:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.02b11:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.02b25:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.03b12:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.03b23:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.03b27:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.03b36:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.03b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.04b58:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.06b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500_firmware:1.06b53:*:*:*:*:*:*:*
- cpe:2.3:h:dlink:dsr-500:-:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.02b11:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.02b25:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.03b12:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.03b23:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.03b27:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.03b36:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.03b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.04b58:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.06b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-500n_firmware:1.06b53:*:*:*:*:*:*:*
- cpe:2.3:h:dlink:dsr-500n:-:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.01b50:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.02b11:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.02b25:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.03b12:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.03b23:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.03b27:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.03b36:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.03b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.04b58:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.06b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000_firmware:1.06b53:*:*:*:*:*:*:*
- cpe:2.3:h:dlink:dsr-1000:-:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.01b50:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b11:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.02b25:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b12:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b23:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b27:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b36:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.03b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.04b58:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b43:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dsr-1000n_firmware:1.06b53:*:*:*:*:*:*:*
- cpe:2.3:h:dlink:dsr-1000n:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-7005
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-7005
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:C/I:N/A:N |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2013-7005
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-7005
-
http://www.exploit-db.com/exploits/30061
Zine: D-Link DSR Router Series - Remote Command Execution - Multiple papers ExploitExploit
Jump to