CVE-2019-17621
CRITICAL WAF: High
CVSS 9.8
Published: 2019-12-30
CWE-78 CWE-78
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
WAF Coverage Analysis
OS Command Injection
High WAF Coverage
OWASP: A03:2021 Injection
932xxx - Remote Code Execution
OS Command Injection
High WAF Coverage
OWASP: A03:2021 Injection
932xxx - Remote Code Execution
Affected Software
| Vendor | Product | Version |
|---|---|---|
| dlink | dir-859_firmware | up to 1.05b03 |
| dlink | dir-859_firmware | 1.06b01 |
| dlink | dir-822_firmware | up to 2.03b01 |
| dlink | dir-822_firmware | up to 3.12b04 |
| dlink | dir-823_firmware | up to 1.00b06 |
| dlink | dir-823_firmware | 1.00b06 |
| dlink | dir-865l_firmware | up to 1.07b01 |
| dlink | dir-868l_firmware | up to 1.12b04 |
| dlink | dir-868l_firmware | up to 2.05b02 |
| dlink | dir-869_firmware | up to 1.03b02 |
References
- packetstormsecurity.com (Exploit, Third Party Advisory, VDB Entry)
- medium.com (Exploit, Third Party Advisory)
- medium.com (Broken Link)
- supportannouncement.us.dlink.com (Patch, Vendor Advisory)
- supportannouncement.us.dlink.com (Patch, Vendor Advisory)
- www.dlink.com (Vendor Advisory)
- www.ftc.gov (Third Party Advisory, US Government Resource)
- www.cisa.gov (US Government Resource)