Home / Vulnerabilities / CVE-2019-20500
HIGH SEVERITY
CVE-2019-20500 D-Link · DWL-2600AP Access Point

D-Link DWL-2600AP Access Point Command Injection Vulnerability

Technical Severity

CVSS v3.1 Metrics

HIGH
7.8 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitation Likelihood

EPSS Prediction

92.07 %
Predictive Probability
Percentile Rank
99.7 th

Documented as more likely to be exploited than 99.7% of known CVEs.

Detection Date

Jun 29, 2023

Remediation Due

Jul 20, 2023

CISA Catalog Active

Threat Analysis

D-Link DWL-2600AP access point contains an authenticated command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.

Remediation Directive

Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

External Intelligence