CVE-2019-17621
critical-risk
Published 2019-12-30
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
Do I need to act?
!
93.0% chance of exploitation in next 30 days
EPSS score — higher than 7% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (19)
Affected Vendors
References (15)
Vendor Advisory
https://www.dlink.com/en/security-bulletin
Third Party Advisory
https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgme...
Vendor Advisory
https://www.dlink.com/en/security-bulletin
Third Party Advisory
https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgme...
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-...
78
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
27/34 · High
Exposure
19/34 · Moderate