CVE-2019-17621
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
30/12/2019
Last modified:
07/11/2025
Description
The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dlink:dir-859_firmware:*:*:*:*:*:*:*:* | 1.05b03 (including) | |
| cpe:2.3:o:dlink:dir-859_firmware:1.06b01:beta1:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dir-859:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-822_firmware:*:*:*:*:*:*:*:* | 2.03b01 (including) | |
| cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-822_firmware:*:*:*:*:*:*:*:* | 3.12b04 (including) | |
| cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-823_firmware:*:*:*:*:*:*:*:* | 1.00b06 (including) | |
| cpe:2.3:o:dlink:dir-823_firmware:1.00b06:beta:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dir-823:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-865l_firmware:*:*:*:*:*:*:*:* | 1.07b01 (including) | |
| cpe:2.3:h:dlink:dir-865l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:* | 1.12b04 (including) | |
| cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-868l_firmware:*:*:*:*:*:*:*:* | 2.05b02 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10146
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147
- https://www.dlink.com/en/security-bulletin
- https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf
- http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10146
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147
- https://www.dlink.com/en/security-bulletin
- https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-17621



