Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-17020

Severity
8.8HIGH
EPSS
6.6%
top 8.81%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 1
Latest updateMay 13

Description

On D-Link DCS-5009 devices with firmware 1.08.11 and earlier, DCS-5010 devices with firmware 1.14.09 and earlier, and DCS-5020L devices with firmware before 1.15.01, command injection in alphapd (binary responsible for running the camera's web server) allows remote authenticated attackers to execute code through sanitized /setSystemAdmin user input in the AdminID field being passed directly to a call to system.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

2
GHSA
GHSA-55r4-xf6q-8cq9: On D-Link DCS-5009 devices with firmware 12022-05-13
CVEList
CVE-2017-17020: On D-Link DCS-5009 devices with firmware 12018-05-01

💥Exploits & PoCs

1
Exploit-DB
DLINK DCS-5020L - Remote Code Execution (PoC)2018-03-27
CVE-2017-17020 (HIGH CVSS 8.8) | On D-Link DCS-5009 devices with fir | cvebase.io