CVE-2019-16920

Scores

EPSS

0.943High94.3%
0%20%40%60%80%100%

Percentile: 94.3%

CVSS

9.8Critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a “PingTest” device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-78

Related Vulnerabilities

Exploits

Exploit ID: CVE-2019-16920

Source: github-poc

URL: https://github.com/eniac888/CVE-2019-16920-MassPwn3r

Recommendations

Source: nvd

The CERT/CC is currently unaware of a practical solution to this problem. The devices listed above are no longer supported by D-Link.Replace affected devicesBecause D-Link is not providing updates to the devices listed above, it is important to replace any affected device with one that is currently supported by the vendor.

URL: https://www.kb.cert.org/vuls/id/766427

Vulnerable Software (10)

Type: Configuration

Vendor: dlink

Product: dap-1533_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dap-1533_firmware:-:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dhp-1565_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dhp-1565_firmware:*:*:*:*:*:*:*:*",
          "versionEndIncluding": "1.01",
          "vulnerable": true
...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-615_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-615_firmware:-:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"
...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-652_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-652_firmware:-:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"
...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-655_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:*",
          "versionEndIncluding": "3.02b05",
          "vulnerable": tru...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-825_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-825_firmware:-:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"
...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-835_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-835_firmware:-:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"
...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-855l_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-855l_firmware:-:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-862l_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-862l_firmware:-:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"...

Source: nvd

Type: Configuration

Vendor: dlink

Product: dir-866l_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:dlink:dir-866l_firmware:*:*:*:*:*:*:*:*",
          "versionEndIncluding": "1.03b04",
          "vulnerable": tr...

Source: nvd