10

CVE-2019-17621

Warning
Exploit

The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

Data is provided by the National Vulnerability Database (NVD)
DlinkDir-859 Firmware Version <= 1.05b03
   DlinkDir-859 Version-
DlinkDir-859 Firmware Version1.06b01 Updatebeta1
   DlinkDir-859 Version-
DlinkDir-822 Firmware Version <= 2.03b01
   DlinkDir-822 Version-
DlinkDir-822 Firmware Version <= 3.12b04
   DlinkDir-822 Version-
DlinkDir-823 Firmware Version <= 1.00b06
   DlinkDir-823 Version-
DlinkDir-823 Firmware Version1.00b06 Updatebeta
   DlinkDir-823 Version-
DlinkDir-865l Firmware Version <= 1.07b01
   DlinkDir-865l Version-
DlinkDir-868l Firmware Version <= 1.12b04
   DlinkDir-868l Version-
DlinkDir-868l Firmware Version <= 2.05b02
   DlinkDir-868l Version-
DlinkDir-869 Firmware Version <= 1.03b02
   DlinkDir-869 Version-
DlinkDir-869 Firmware Version1.03b02 Updatebeta02
   DlinkDir-869 Version-
DlinkDir-880l Firmware Version <= 1.08b04
   DlinkDir-880l Version-
DlinkDir-890l Firmware Version <= 1.11b01
   DlinkDir-890l Version-
DlinkDir-890l Firmware Version1.11b01 Updatebeta01
   DlinkDir-890l Version-
DlinkDir-890r Firmware Version <= 1.11b01
   DlinkDir-890r Version-
DlinkDir-890r Firmware Version1.11b01 Updatebeta01
   DlinkDir-890r Version-
DlinkDir-885l Firmware Version <= 1.12b05
   DlinkDir-885l Version-
DlinkDir-885r Firmware Version <= 1.12b05
   DlinkDir-885r Version-
DlinkDir-895l Firmware Version <= 1.12b10
   DlinkDir-895l Version-
DlinkDir-895r Firmware Version <= 1.12b10
   DlinkDir-895r Version-
DlinkDir-818lx Firmware Version-
   DlinkDir-818lx Version-

29.06.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog

D-Link DIR-859 Router Command Execution Vulnerability

Vulnerability

D-Link DIR-859 router contains a command execution vulnerability in the UPnP endpoint URL, /gena.cgi. Exploitation allows an unauthenticated remote attacker to execute system commands as root by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

Description

Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 93.19% 0.998
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.