CVE-2017-8415
Summary
| CVE | CVE-2017-8415 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-07-02 21:15:00 UTC |
| Updated | 2021-04-26 16:09:00 UTC |
| Description | An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device has a custom telnet daemon as a part of the busybox and retrieves the password from the shadow file using the function getspnam at address 0x00053894. Then performs a crypt operation on the password retrieved from the user at address 0x000538E0 and performs a strcmp at address 0x00053908 to check if the password is correct or incorrect. However, the /etc/shadow file is a part of CRAM-FS filesystem which means that the user cannot change the password and hence a hardcoded hash in /etc/shadow is used to match the credentials provided by the user. This is a salted hash of the string "admin" and hence it acts as a password to the device which cannot be changed as the whole filesystem is read only. |
Risk And Classification
Problem Types: CWE-798
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Dlink | Dcs-1100 | - | All | All | All |
| Hardware | Dlink | Dcs-1100 | - | All | All | All |
| Operating System | Dlink | Dcs-1100 Firmware | - | All | All | All |
| Operating System | Dlink | Dcs-1100 Firmware | - | All | All | All |
| Hardware | Dlink | Dcs-1130 | - | All | All | All |
| Hardware | Dlink | Dcs-1130 | - | All | All | All |
| Operating System | Dlink | Dcs-1130 Firmware | - | All | All | All |
| Operating System | Dlink | Dcs-1130 Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IoT_vulnerabilities/Dlink_DCS_1130_security.pdf at master · ethanhunnt/IoT_vulnerabilities · GitHub | MISC | github.com | Not Applicable, Third Party Advisory |
| Dlink DCS-1130 Command Injection / CSRF / Stack Overflow ≈ Packet Storm | MISC | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| Bugtraq: Newly releases IoT security issues | BUGTRAQ | seclists.org | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.