Vulnerability Description
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-859 Firmware | <= 1.05b03 |
| Dlink | Dir-859 | - |
| Dlink | Dir-822 Firmware | <= 2.03b01 |
| Dlink | Dir-822 | - |
| Dlink | Dir-823 Firmware | <= 1.00b06 |
| Dlink | Dir-823 | - |
| Dlink | Dir-865L Firmware | <= 1.07b01 |
| Dlink | Dir-865L | - |
| Dlink | Dir-868L Firmware | <= 1.12b04 |
| Dlink | Dir-868L | - |
| Dlink | Dir-869 Firmware | <= 1.03b02 |
| Dlink | Dir-869 | - |
| Dlink | Dir-880L Firmware | <= 1.08b04 |
| Dlink | Dir-880L | - |
| Dlink | Dir-890L Firmware | <= 1.11b01 |
| Dlink | Dir-890L | - |
| Dlink | Dir-890R Firmware | <= 1.11b01 |
| Dlink | Dir-890R | - |
| Dlink | Dir-885L Firmware | <= 1.12b05 |
| Dlink | Dir-885L | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-RemotExploitThird Party AdvisoryVDB Entry
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-eExploitThird Party Advisory
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-eBroken Link
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1PatchVendor Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1PatchVendor Advisory
- https://www.dlink.com/en/security-bulletinVendor Advisory
- https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgmeThird Party AdvisoryUS Government Resource
- http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-RemotExploitThird Party AdvisoryVDB Entry
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-eExploitThird Party Advisory
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-eBroken Link
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1PatchVendor Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1PatchVendor Advisory
- https://www.dlink.com/en/security-bulletinVendor Advisory
- https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgmeThird Party AdvisoryUS Government Resource
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-US Government Resource
FAQ
What is CVE-2019-17621?
CVE-2019-17621 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted ...
How severe is CVE-2019-17621?
CVE-2019-17621 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17621?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-859 Firmware, Dlink Dir-859, Dlink Dir-822 Firmware, Dlink Dir-822, Dlink Dir-823 Firmware.