Vulnerability Note VU#184100
D-Link DAP-1320 Rev Ax is vulnerable to a command injection
The D-Link DAP-1320 Rev Ax firmware update mechanism contains a command injection vulnerability.
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
A remote unauthenticated attacker may execute commands on the device by taking advantage of the firmware update mechanism. This attack does require interception and manipulation of network communications using commonly available tools.
A remote unauthenticated attacker may execute commands on the device by taking advantage of the firmware update mechanism.
Update the firmware
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|D-Link Systems, Inc.||Affected||-||13 Mar 2015|
CVSS Metrics (Learn More)
Thanks to Mike Baucom, Allen Harper, and J. Rach of Tangible Security for discovering and reporting this vulnerability. Tangible Security would also like to publically thank D-Link for their cooperation and desire to make their products and customers more secure.
This document was written by Garret Wassermann.
- CVE IDs: CVE-2015-2050
- Date Public: 13 Mar 2015
- Date First Published: 16 Mar 2015
- Date Last Updated: 16 Mar 2015
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.