Home / Vulnerabilities / CVE-2019-17621
CRITICAL SEVERITY
CVE-2019-17621 D-Link · DIR-859 Router

D-Link DIR-859 Router Command Execution Vulnerability

Technical Severity

CVSS v3.1 Metrics

CRITICAL
9.8 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Likelihood

EPSS Prediction

93.30 %
Predictive Probability
Percentile Rank
99.8 th

Documented as more likely to be exploited than 99.8% of known CVEs.

Detection Date

Jun 29, 2023

Remediation Due

Jul 20, 2023

CISA Catalog Active

Threat Analysis

D-Link DIR-859 router contains a command execution vulnerability in the UPnP endpoint URL, /gena.cgi. Exploitation allows an unauthenticated remote attacker to execute system commands as root by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

Remediation Directive

Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

External Intelligence