Vulnerability Description
The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dns-320 Firmware | <= 2.05.b10 |
| Dlink | Dns-320 | - |
Related Weaknesses (CWE)
References
- https://blog.cystack.net/d-link-dns-320-rce/ExploitThird Party Advisory
- https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgmeThird Party AdvisoryUS Government Resource
- https://blog.cystack.net/d-link-dns-320-rce/ExploitThird Party Advisory
- https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgmeThird Party AdvisoryUS Government Resource
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-US Government Resource
FAQ
What is CVE-2019-16057?
CVE-2019-16057 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.
How severe is CVE-2019-16057?
CVE-2019-16057 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-16057?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dns-320 Firmware, Dlink Dns-320.