CVE-2019-16920

Scores

EPSS

0.943high94.3%
0%20%40%60%80%100%

Percentile: 94.3%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a “PingTest” device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-78

Related Vulnerabilities

Exploits

Exploit ID: CVE-2019-16920

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Vulnerable Software (10)

Type: Configuration

Vendor: *

Product: dap-1533_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dap-1533_firmware:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: *

Product: dhp-1565_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dhp-1565_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "1.01",          "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-615_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-615_firmware:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-652_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-652_firmware:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-655_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "3.02b05",          "vulnerable": tru...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-825_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-825_firmware:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-835_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-835_firmware:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-855l_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-855l_firmware:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-862l_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-862l_firmware:-:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: *

Product: dir-866l_firmware

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:dlink:dir-866l_firmware:*:*:*:*:*:*:*:*",          "versionEndIncluding": "1.03b04",          "vulnerable": tr...

Source: nvd

End of list