TROYANOSYVIRUS
Retour aux CVEs

CVE-2019-16920

CRITICALCISA KEV
9.8

Description

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie9/27/2019
Derniere modification11/7/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurD-Link
ProduitMultiple Routers
Nom vulnerabiliteD-Link Multiple Routers Command Injection Vulnerability
Date ajout KEV2022-03-25
Date limite remediation2022-04-15
Utilise dans ransomwareUnknown

Produits affectes

dlink:dap-1533dlink:dap-1533_firmwaredlink:dhp-1565dlink:dhp-1565_firmwaredlink:dir-615dlink:dir-615_firmwaredlink:dir-652dlink:dir-652_firmwaredlink:dir-655dlink:dir-655_firmwaredlink:dir-825dlink:dir-825_firmwaredlink:dir-835dlink:dir-835_firmwaredlink:dir-855ldlink:dir-855l_firmwaredlink:dir-862ldlink:dir-862l_firmwaredlink:dir-866ldlink:dir-866l_firmware

Faiblesses (CWE)

CWE-78CWE-78

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.