Vulnerabilites related to dlink - dir-866l
var-201909-0903
Vulnerability from variot
Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825. plural D-Link The product includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-655C, etc. are all wireless routers from Taiwan D-Link. Attackers can use this vulnerability to inject commands to invade the system. The following products and versions are affected: D-Link DIR-655C; DIR-866L; DIR-652; DHP-1565, etc.
Exploiting this issue could allow an malicious user to execute arbitrary commands in the context of the affected device. Failed exploit attempts will likely result in denial-of-service conditions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0903", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-652", "scope": "eq", "trust": 1.6, "vendor": "dlink", "version": null }, { "model": "dhp-1565", "scope": null, "trust": 1.4, "vendor": "d link", "version": null }, { "model": "dir-652", "scope": null, "trust": 1.4, "vendor": "d link", "version": null }, { "model": "dir-866l", "scope": null, "trust": 1.4, "vendor": "d link", "version": null }, { "model": "dir-655", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "3.02b05" }, { "model": "dir-855l", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": null }, { "model": "dir-825", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": null }, { "model": "dir-835", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": null }, { "model": "dir-862l", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": null }, { "model": "dhp-1565", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "1.01" }, { "model": "dir-615", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": null }, { "model": "dir-866l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "1.03b04" }, { "model": "dap-1533", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": "dir-655", "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": "dir-655c", "scope": null, "trust": 0.6, "vendor": "d link", "version": null }, { "model": "dir-652", "scope": "eq", "trust": 0.6, "vendor": "dlink", "version": "ax" }, { "model": "dir-655", "scope": "eq", "trust": 0.6, "vendor": "dlink", "version": "cx" }, { "model": "dir-866l", "scope": "eq", "trust": 0.6, "vendor": "dlink", "version": "ax" }, { "model": "dhp-1565", "scope": "eq", "trust": 0.6, "vendor": "dlink", "version": "ax" } ], "sources": [ { "db": "CERT/CC", "id": "VU#766427" }, { "db": "CNVD", "id": "CNVD-2019-33820" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "db": "CNNVD", "id": "CNNVD-201909-1326" }, { "db": "NVD", "id": "CVE-2019-16920" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:d-link:dhp-1565_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:d-link:dir-652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:d-link:dir-655_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:d-link:dir-866l_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009977" } ] }, "cve": "CVE-2019-16920", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2019-16920", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "availabilityRequirement": "NOT DEFINED", "baseScore": 10.0, "collateralDamagePotential": "NOT DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 6.7, "exploitability": "PROOF-OF-CONCEPT", "exploitabilityScore": 10.0, "id": "CVE-2019-16920", "impactScore": 10.0, "integrityImpact": "COMPLETE", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "UNAVAILABLE", "reportConfidence": "CONFIRMED", "severity": "HIGH", "targetDistribution": "MEDIUM", "trust": 0.8, "userInteractionRequired": null, "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-33820", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-149115", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-16920", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-16920", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-16920", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-16920", "trust": 0.8, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-16920", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2019-33820", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-1326", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-149115", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-16920", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#766427" }, { "db": "CNVD", "id": "CNVD-2019-33820" }, { "db": "VULHUB", "id": "VHN-149115" }, { "db": "VULMON", "id": "CVE-2019-16920" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "db": "CNNVD", "id": "CNNVD-201909-1326" }, { "db": "NVD", "id": "CVE-2019-16920" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a \"PingTest\" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825. plural D-Link The product includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-655C, etc. are all wireless routers from Taiwan D-Link. Attackers can use this vulnerability to inject commands to invade the system. The following products and versions are affected: D-Link DIR-655C; DIR-866L; DIR-652; DHP-1565, etc. \n \nExploiting this issue could allow an malicious user to execute arbitrary commands in the context of the affected device. Failed exploit attempts will likely result in denial-of-service conditions", "sources": [ { "db": "NVD", "id": "CVE-2019-16920" }, { "db": "CERT/CC", "id": "VU#766427" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "db": "CNVD", "id": "CNVD-2019-33820" }, { "db": "VULHUB", "id": "VHN-149115" }, { "db": "VULMON", "id": "CVE-2019-16920" } ], "trust": 3.06 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/766427", "trust": 0.8, "type": "poc" } ], "sources": [ { "db": "CERT/CC", "id": "VU#766427" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-16920", "trust": 4.0 }, { "db": "CERT/CC", "id": "VU#766427", "trust": 1.9 }, { "db": "SEEBUG", "id": "SSVID-98079", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95198984", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-009977", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201909-1326", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-33820", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-149115", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-16920", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#766427" }, { "db": "CNVD", "id": "CNVD-2019-33820" }, { "db": "VULHUB", "id": "VHN-149115" }, { "db": "VULMON", "id": "CVE-2019-16920" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "db": "CNNVD", "id": "CNNVD-201909-1326" }, { "db": "NVD", "id": "CVE-2019-16920" } ] }, "id": "VAR-201909-0903", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-33820" }, { "db": "VULHUB", "id": "VHN-149115" } ], "trust": 1.3022921822222222 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-33820" } ] }, "last_update_date": "2024-11-23T22:11:50.020000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.dlink.com/en/consumer" }, { "title": "myscan", "trust": 0.1, "url": "https://github.com/amcai/myscan " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-16920" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-149115" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "db": "NVD", "id": "CVE-2019-16920" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://fortiguard.com/zeroday/fg-vd-19-117" }, { "trust": 1.7, "url": "https://www.seebug.org/vuldb/ssvid-98079" }, { "trust": 1.5, "url": "https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3" }, { "trust": 1.1, "url": "https://www.kb.cert.org/vuls/id/766427" }, { "trust": 1.0, "url": "https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3" }, { "trust": 0.8, "url": "https://www.fortinet.com/blog/threat-research/d-link-routers-found-vulnerable-rce.html" }, { "trust": 0.8, "url": "https://tools.ietf.org/html/rfc3875" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16920" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95198984/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16920" } ], "sources": [ { "db": "CERT/CC", "id": "VU#766427" }, { "db": "CNVD", "id": "CNVD-2019-33820" }, { "db": "VULHUB", "id": "VHN-149115" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "db": "CNNVD", "id": "CNNVD-201909-1326" }, { "db": "NVD", "id": "CVE-2019-16920" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#766427" }, { "db": "CNVD", "id": "CNVD-2019-33820" }, { "db": "VULHUB", "id": "VHN-149115" }, { "db": "VULMON", "id": "CVE-2019-16920" }, { "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "db": "CNNVD", "id": "CNNVD-201909-1326" }, { "db": "NVD", "id": "CVE-2019-16920" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-23T00:00:00", "db": "CERT/CC", "id": "VU#766427" }, { "date": "2019-09-29T00:00:00", "db": "CNVD", "id": "CNVD-2019-33820" }, { "date": "2019-09-27T00:00:00", "db": "VULHUB", "id": "VHN-149115" }, { "date": "2019-09-27T00:00:00", "db": "VULMON", "id": "CVE-2019-16920" }, { "date": "2019-10-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "date": "2019-09-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-1326" }, { "date": "2019-09-27T12:15:10.017000", "db": "NVD", "id": "CVE-2019-16920" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-25T00:00:00", "db": "CERT/CC", "id": "VU#766427" }, { "date": "2019-09-29T00:00:00", "db": "CNVD", "id": "CNVD-2019-33820" }, { "date": "2019-10-10T00:00:00", "db": "VULHUB", "id": "VHN-149115" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2019-16920" }, { "date": "2019-11-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009977" }, { "date": "2019-10-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-1326" }, { "date": "2024-11-21T04:31:20.637000", "db": "NVD", "id": "CVE-2019-16920" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-1326" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple D-Link routers vulnerable to remote command execution", "sources": [ { "db": "CERT/CC", "id": "VU#766427" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-1326" } ], "trust": 0.6 } }
var-201910-0843
Vulnerability from variot
D-Link DIR-866L 1.03B04 devices allow XSS via HtmlResponseMessage in the device common gateway interface, leading to common injection. D-Link DIR-866L The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-Link DIR-866L is a wireless router from Taiwan D-Link.
A cross-site scripting vulnerability exists in D-Link DIR-866L 1.03B04. A remote attacker could use the device's common gateway interface to exploit this vulnerability to execute arbitrary code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201910-0843", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-866l", "scope": "eq", "trust": 1.8, "vendor": "d link", "version": "1.03b04" }, { "model": "dir-866l 1.03b04", "scope": null, "trust": 0.6, "vendor": "d link", "version": null }, { "model": "dir-866l", "scope": "eq", "trust": 0.6, "vendor": "dlink", "version": null }, { "model": "dir-866l", "scope": "eq", "trust": 0.6, "vendor": "dlink", "version": "1.03b04" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" }, { "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "db": "CNNVD", "id": "CNNVD-201910-1079" }, { "db": "NVD", "id": "CVE-2019-17663" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:d-link:dir-866l_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011153" } ] }, "cve": "CVE-2019-17663", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2019-17663", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2019-39552", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "id": "CVE-2019-17663", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.1, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-17663", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-17663", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-17663", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-39552", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201910-1079", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" }, { "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "db": "CNNVD", "id": "CNNVD-201910-1079" }, { "db": "NVD", "id": "CVE-2019-17663" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-866L 1.03B04 devices allow XSS via HtmlResponseMessage in the device common gateway interface, leading to common injection. D-Link DIR-866L The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-Link DIR-866L is a wireless router from Taiwan D-Link. \n\nA cross-site scripting vulnerability exists in D-Link DIR-866L 1.03B04. A remote attacker could use the device\u0027s common gateway interface to exploit this vulnerability to execute arbitrary code", "sources": [ { "db": "NVD", "id": "CVE-2019-17663" }, { "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "db": "CNVD", "id": "CNVD-2019-39552" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-17663", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011153", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-39552", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201910-1079", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" }, { "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "db": "CNNVD", "id": "CNNVD-201910-1079" }, { "db": "NVD", "id": "CVE-2019-17663" } ] }, "id": "VAR-201910-0843", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" } ], "trust": 1.2666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" } ] }, "last_update_date": "2024-11-23T22:58:30.219000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.dlink.com/en/consumer" }, { "title": "Patch for D-Link DIR-866L Cross-Site Scripting Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/189075" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" }, { "db": "JVNDB", "id": "JVNDB-2019-011153" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "db": "NVD", "id": "CVE-2019-17663" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://fortiguard.com/zeroday/fg-vd-19-116" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17663" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17663" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" }, { "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "db": "CNNVD", "id": "CNNVD-201910-1079" }, { "db": "NVD", "id": "CVE-2019-17663" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-39552" }, { "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "db": "CNNVD", "id": "CNNVD-201910-1079" }, { "db": "NVD", "id": "CVE-2019-17663" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-07T00:00:00", "db": "CNVD", "id": "CNVD-2019-39552" }, { "date": "2019-10-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "date": "2019-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-1079" }, { "date": "2019-10-16T18:15:25.590000", "db": "NVD", "id": "CVE-2019-17663" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-07T00:00:00", "db": "CNVD", "id": "CNVD-2019-39552" }, { "date": "2019-10-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011153" }, { "date": "2019-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-1079" }, { "date": "2024-11-21T04:32:43.773000", "db": "NVD", "id": "CVE-2019-17663" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-1079" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-866L Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2019-39552" }, { "db": "CNNVD", "id": "CNNVD-201910-1079" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-1079" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://fortiguard.com/zeroday/FG-VD-19-117 | Broken Link, Third Party Advisory | |
cve@mitre.org | https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3 | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.kb.cert.org/vuls/id/766427 | Third Party Advisory, US Government Resource | |
cve@mitre.org | https://www.seebug.org/vuldb/ssvid-98079 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/zeroday/FG-VD-19-117 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/766427 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.seebug.org/vuldb/ssvid-98079 | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
dlink | dir-655_firmware | * | |
dlink | dir-655 | cx | |
dlink | dir-866l_firmware | * | |
dlink | dir-866l | ax | |
dlink | dir-652_firmware | - | |
dlink | dir-652 | ax | |
dlink | dhp-1565_firmware | * | |
dlink | dhp-1565 | ax | |
dlink | dir-855l_firmware | - | |
dlink | dir-855l | - | |
dlink | dap-1533_firmware | - | |
dlink | dap-1533 | - | |
dlink | dir-862l_firmware | - | |
dlink | dir-862l | - | |
dlink | dir-615_firmware | - | |
dlink | dir-615 | - | |
dlink | dir-835_firmware | - | |
dlink | dir-835 | - | |
dlink | dir-825_firmware | - | |
dlink | dir-825 | - |
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "The impacted product is end-of-life and should be disconnected if still in use.", "cisaVulnerabilityName": "D-Link Multiple Routers Command Injection Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "525853B4-1C30-4D96-AD4F-26FD77469B33", "versionEndIncluding": "3.02b05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-655:cx:*:*:*:*:*:*:*", "matchCriteriaId": "8F90F9E0-0F90-4AFD-868C-370882C47248", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-866l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA174575-0468-4AB1-A504-B5AA559D3219", "versionEndIncluding": "1.03b04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-866l:ax:*:*:*:*:*:*:*", "matchCriteriaId": "52177D2B-D7F8-4351-A169-FDF6A5FBF44D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1147272F-0F23-4606-A84E-CA971414C65B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-652:ax:*:*:*:*:*:*:*", "matchCriteriaId": "2E4D52D3-71FD-4D29-881A-393B35F3DB65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dhp-1565_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "369D2C8E-89F1-4E03-8DA0-BA2DB1245569", "versionEndIncluding": "1.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dhp-1565:ax:*:*:*:*:*:*:*", "matchCriteriaId": "BAFB86EA-966B-4DB3-9B81-198878D76573", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-855l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "239F0015-2834-4DBB-B115-58871D0FF764", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-855l:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB62BC4-69BC-40D7-A8E7-F5728B827250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dap-1533_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB7D656D-47B5-4269-A155-741D60F818CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dap-1533:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3E4627-940F-4859-BC67-B6229BC0AFD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-862l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "380A4761-5474-4F52-A4EE-62844D5EE82C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-862l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0552E33F-BB39-4701-B91A-1DB33992505C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C55E6D4-820D-469F-A343-635A621C0D7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E92E959-C211-4979-A233-163BEFCF6F0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCFE0993-C19A-4C60-B8C6-E549D748537A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-835:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1B91013-E79E-4076-916D-D52D6E417EA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-825_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEC49DA6-D1F4-4A2A-904E-907356F3C804", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*", "matchCriteriaId": "7038F8A9-03F3-4442-B371-84801EF05447", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a \"PingTest\" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825." }, { "lang": "es", "value": "La ejecuci\u00f3n de c\u00f3digo remota no autenticada se presenta en productos D-Link tales como DIR-655C, DIR-866L, DIR-652, y DHP-1565. El problema se presenta cuando el atacante env\u00eda una entrada arbitraria hacia una interfaz de la puerta de enlace com\u00fan del dispositivo \"PingTest\" que podr\u00eda conllevar a una inyecci\u00f3n com\u00fan. Un atacante que activa con \u00e9xito la inyecci\u00f3n de comando podr\u00eda lograr un compromiso total del sistema. Despu\u00e9s, se descubri\u00f3 de manera independiente que estos tambi\u00e9n se ven afectados: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835 y DIR-825." } ], "id": "CVE-2019-16920", "lastModified": "2025-02-04T20:15:32.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-09-27T12:15:10.017", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-117" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/766427" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.seebug.org/vuldb/ssvid-98079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/766427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.seebug.org/vuldb/ssvid-98079" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://fortiguard.com/zeroday/FG-VD-19-116 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/zeroday/FG-VD-19-116 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
d-link | dir-866l_firmware | 1.03b04 | |
dlink | dir-866l | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:d-link:dir-866l_firmware:1.03b04:*:*:*:*:*:*:*", "matchCriteriaId": "96EB0DFA-3A94-4F48-B81A-E92A64411019", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-866l:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CC92F0-0745-4317-A08F-44423EA95CEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-866L 1.03B04 devices allow XSS via HtmlResponseMessage in the device common gateway interface, leading to common injection." }, { "lang": "es", "value": "Los dispositivos D-Link DIR-866L versi\u00f3n 1.03B04, permiten un ataque de tipo XSS por medio de la funci\u00f3n HtmlResponseMessage en la interfaz gateway com\u00fan del dispositivo, conllevando a una inyecci\u00f3n com\u00fan." } ], "id": "CVE-2019-17663", "lastModified": "2024-11-21T04:32:43.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-16T18:15:25.590", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-116" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-16920
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/zeroday/FG-VD-19-117 | x_refsource_MISC | |
https://www.seebug.org/vuldb/ssvid-98079 | x_refsource_MISC | |
https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3 | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/766427 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-117" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.seebug.org/vuldb/ssvid-98079" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3" }, { "name": "VU#766427", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/766427" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-16920", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T20:04:10.590560Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-16920" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T20:04:50.678Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a \"PingTest\" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-23T19:06:26.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-117" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.seebug.org/vuldb/ssvid-98079" }, { "tags": [ "x_refsource_MISC" ], "url": "https://medium.com/%4080vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3" }, { "name": "VU#766427", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/766427" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16920", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a \"PingTest\" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/zeroday/FG-VD-19-117", "refsource": "MISC", "url": "https://fortiguard.com/zeroday/FG-VD-19-117" }, { "name": "https://www.seebug.org/vuldb/ssvid-98079", "refsource": "MISC", "url": "https://www.seebug.org/vuldb/ssvid-98079" }, { "name": "https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3", "refsource": "MISC", "url": "https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3" }, { "name": "VU#766427", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/766427" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16920", "datePublished": "2019-09-27T11:34:12.000Z", "dateReserved": "2019-09-27T00:00:00.000Z", "dateUpdated": "2025-02-04T20:04:50.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17663
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://fortiguard.com/zeroday/FG-VD-19-116 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:47:13.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-116" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "D-Link DIR-866L 1.03B04 devices allow XSS via HtmlResponseMessage in the device common gateway interface, leading to common injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-16T17:55:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://fortiguard.com/zeroday/FG-VD-19-116" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17663", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "D-Link DIR-866L 1.03B04 devices allow XSS via HtmlResponseMessage in the device common gateway interface, leading to common injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/zeroday/FG-VD-19-116", "refsource": "MISC", "url": "https://fortiguard.com/zeroday/FG-VD-19-116" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17663", "datePublished": "2019-10-16T17:55:28", "dateReserved": "2019-10-16T00:00:00", "dateUpdated": "2024-08-05T01:47:13.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }