CISA KEV 정보
| 취약점명 | D-Link Multiple Routers Command Injection Vulnerability |
|---|---|
| 설명 | Multiple D-Link routers contain a command injection vulnerability which can allow attackers to achieve full system compromise. |
| 조치사항 | The impacted product is end-of-life and should be disconnected if still in use. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-78 |
| 등록일 (KEV) | 2022-03-25 |
| 조치 기한 | 2022-04-15 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2019-16920 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HAV:N/AC:L/Au:N/C:C/I:C/A:C설명: Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.
CWE: CWE-78 | CWE-78
참조
- https://fortiguard.com/zeroday/FG-VD-19-117 [Broken Link, Third Party Advisory]
- https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3 [Exploit, Third Party Advisory]
- https://www.kb.cert.org/vuls/id/766427 [Third Party Advisory, US Government Resource]
- https://www.seebug.org/vuldb/ssvid-98079 [Exploit, Third Party Advisory]
- https://fortiguard.com/zeroday/FG-VD-19-117 [Broken Link, Third Party Advisory]
- https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3 [Exploit, Third Party Advisory]
- https://www.kb.cert.org/vuls/id/766427 [Third Party Advisory, US Government Resource]
- https://www.seebug.org/vuldb/ssvid-98079 [Exploit, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-16920 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.