Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

D-Link DSR-250N DoS Vulnerability (CVE-2020-26567)

Information

Severity

Severity

Medium

Family

Family

Denial of Service

CVSSv2 Base

CVSSv2 Base

4.9

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

D-Link DSR-250N devices are prone to a Denial-of-Service (DoS) vulnerability.

Insight

Insight

CGI scripts exist on the router that can be directly accessed with a web browser, without any authentication. In particular, the script '/scgi-bin/upgradeStatusReboot.cgi' executes the command to reboot the device.

Affected Software

Affected Software

D-Link DSR-250N devices with firmware version 3.12 and below are known to be affected. Other D-Link DSR models might be affected as well.

Detection Method

Detection Method

Sends a crafted HTTP GET request and checks if the device isn't accessible anymore afterwards.

Solution

Solution

Update to version 3.17B301C_WW or later. Please see the referenced vendor advisory for more information.

Common Vulnerabilities and Exposures (CVE)