TROYANOSYVIRUS
Volver a CVEs

CVE-2019-16920

CRITICALCISA KEV
9.8

Descripcion

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado9/27/2019
Ultima modificacion11/7/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorD-Link
ProductoMultiple Routers
Nombre vulnerabilidadD-Link Multiple Routers Command Injection Vulnerability
Fecha inclusion KEV2022-03-25
Fecha limite remediacion2022-04-15
Uso en ransomwareUnknown

Productos afectados

dlink:dap-1533dlink:dap-1533_firmwaredlink:dhp-1565dlink:dhp-1565_firmwaredlink:dir-615dlink:dir-615_firmwaredlink:dir-652dlink:dir-652_firmwaredlink:dir-655dlink:dir-655_firmwaredlink:dir-825dlink:dir-825_firmwaredlink:dir-835dlink:dir-835_firmwaredlink:dir-855ldlink:dir-855l_firmwaredlink:dir-862ldlink:dir-862l_firmwaredlink:dir-866ldlink:dir-866l_firmware

Debilidades (CWE)

CWE-78CWE-78

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.