TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2019-16920

CRITICALCISA KEV
9.8

Beschreibung

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht9/27/2019
Zuletzt geandert11/7/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerD-Link
ProduktMultiple Routers
SchwachstellennameD-Link Multiple Routers Command Injection Vulnerability
KEV Aufnahmedatum2022-03-25
Behebungsfrist2022-04-15
Ransomware-NutzungUnknown

Betroffene Produkte

dlink:dap-1533dlink:dap-1533_firmwaredlink:dhp-1565dlink:dhp-1565_firmwaredlink:dir-615dlink:dir-615_firmwaredlink:dir-652dlink:dir-652_firmwaredlink:dir-655dlink:dir-655_firmwaredlink:dir-825dlink:dir-825_firmwaredlink:dir-835dlink:dir-835_firmwaredlink:dir-855ldlink:dir-855l_firmwaredlink:dir-862ldlink:dir-862l_firmwaredlink:dir-866ldlink:dir-866l_firmware

Schwachen (CWE)

CWE-78CWE-78

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.