Executive Summary

Informations
NameCVE-2013-7471First vendor Publication2019-06-11
VendorCveLast vendor Modification2019-06-12

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7471

CWE : Common Weakness Enumeration

%idName
100 %CWE-77Improper Sanitization of Special Elements used in a Command ('Command Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware1
Hardware1
Hardware1
Hardware1
Hardware1
Os1
Os1

Sources (Detail)

SourceUrl
MISC http://www.s3cur1ty.de/m1adv2013-020
https://www.exploit-db.com/exploits/27044

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-06-12 21:19:19
  • Multiple Updates
2019-06-12 05:19:12
  • First insertion