10
CVE-2019-16920
- EPSS 94.34%
- Veröffentlicht 27.09.2019 12:15:10
- Zuletzt bearbeitet 03.04.2025 19:51:22
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dlink ≫ Dir-655 Firmware Version <= 3.02b05
Dlink ≫ Dir-866l Firmware Version <= 1.03b04
Dlink ≫ Dir-652 Firmware Version-
Dlink ≫ Dhp-1565 Firmware Version <= 1.01
Dlink ≫ Dir-855l Firmware Version-
Dlink ≫ Dap-1533 Firmware Version-
Dlink ≫ Dir-862l Firmware Version-
Dlink ≫ Dir-615 Firmware Version-
Dlink ≫ Dir-835 Firmware Version-
Dlink ≫ Dir-825 Firmware Version-
25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
D-Link Multiple Routers Command Injection Vulnerability
SchwachstelleMultiple D-Link routers contain a command injection vulnerability which can allow attackers to achieve full system compromise.
BeschreibungThe impacted product is end-of-life and should be disconnected if still in use.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.34% | 0.999 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.