Vulnerability Details : CVE-2021-27250
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2020 v1.01rc001 Wi-Fi access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of CGI scripts. When parsing the errorpage request parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-11856.
Vulnerability category: File inclusion
Products affected by CVE-2021-27250
- cpe:2.3:o:dlink:dap-2020_firmware:1.01:rc001:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-27250
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-27250
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:P/I:N/A:N |
6.5
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
Zero Day Initiative | |
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2021-27250
-
The product allows user input to control or influence paths or file names that are used in filesystem operations.Assigned by: zdi-disclosures@trendmicro.com (Primary)
References for CVE-2021-27250
-
https://www.zerodayinitiative.com/advisories/ZDI-21-205/
ZDI-21-205 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10201
D-Link Technical SupportPatch;Vendor Advisory
Jump to