10

CVE-2019-16920

Warnung
Exploit

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DlinkDir-655 Firmware Version <= 3.02b05
   DlinkDir-655 Versioncx
DlinkDir-866l Firmware Version <= 1.03b04
   DlinkDir-866l Versionax
DlinkDir-652 Firmware Version-
   DlinkDir-652 Versionax
DlinkDhp-1565 Firmware Version <= 1.01
   DlinkDhp-1565 Versionax
DlinkDir-855l Firmware Version-
   DlinkDir-855l Version-
DlinkDap-1533 Firmware Version-
   DlinkDap-1533 Version-
DlinkDir-862l Firmware Version-
   DlinkDir-862l Version-
DlinkDir-615 Firmware Version-
   DlinkDir-615 Version-
DlinkDir-835 Firmware Version-
   DlinkDir-835 Version-
DlinkDir-825 Firmware Version-
   DlinkDir-825 Version-

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

D-Link Multiple Routers Command Injection Vulnerability

Schwachstelle

Multiple D-Link routers contain a command injection vulnerability which can allow attackers to achieve full system compromise.

Beschreibung

The impacted product is end-of-life and should be disconnected if still in use.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.34% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.