← Zuruck zu CVEs
CVE-2019-17621
CRITICALCISA KEV9.8
Beschreibung
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/30/2019
Zuletzt geandert11/7/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerD-Link
ProduktDIR-859 Router
SchwachstellennameD-Link DIR-859 Router Command Execution Vulnerability
KEV Aufnahmedatum2023-06-29
Behebungsfrist2023-07-20
Ransomware-NutzungUnknown
Betroffene Produkte
dlink:dir-818lxdlink:dir-818lx_firmwaredlink:dir-822dlink:dir-822_firmwaredlink:dir-823dlink:dir-823_firmwaredlink:dir-859dlink:dir-859_firmwaredlink:dir-865ldlink:dir-865l_firmwaredlink:dir-868ldlink:dir-868l_firmwaredlink:dir-869dlink:dir-869_firmwaredlink:dir-880ldlink:dir-880l_firmwaredlink:dir-885ldlink:dir-885l_firmwaredlink:dir-885rdlink:dir-885r_firmwaredlink:dir-890ldlink:dir-890l_firmwaredlink:dir-890rdlink:dir-890r_firmwaredlink:dir-895ldlink:dir-895l_firmwaredlink:dir-895rdlink:dir-895r_firmware
Schwachen (CWE)
CWE-78CWE-78
Referenzen
http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html(cve@mitre.org)
https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104(cve@mitre.org)
https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9(cve@mitre.org)
https://www.dlink.com/en/security-bulletin(cve@mitre.org)
https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf(cve@mitre.org)
http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104(af854a3a-2127-422b-91ae-364da2661108)
https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9(af854a3a-2127-422b-91ae-364da2661108)
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10146(af854a3a-2127-422b-91ae-364da2661108)
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147(af854a3a-2127-422b-91ae-364da2661108)
https://www.dlink.com/en/security-bulletin(af854a3a-2127-422b-91ae-364da2661108)
https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-17621(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.