CISA KEV 정보
| 취약점명 | D-Link DWL-2600AP Access Point Command Injection Vulnerability |
|---|---|
| 설명 | D-Link DWL-2600AP access point contains an authenticated command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter. |
| 조치사항 | Apply updates per vendor instructions or discontinue use of the product if updates are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-78 |
| 등록일 (KEV) | 2023-06-29 |
| 조치 기한 | 2023-07-20 |
| 추가 참고 | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113; https://nvd.nist.gov/vuln/detail/CVE-2019-20500 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.
CWE: CWE-78 | CWE-78
참조
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113 [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/46841 [Exploit, Third Party Advisory, VDB Entry]
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113 [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/46841 [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-20500 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.