D-Link DIR-859 Wi-Fi router 1.05 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) Vulnerability

Summary

D-Link DIR-859 Wi-Fi router 1.05 suffers from improper neutralization of special elements used in an os command (‘OS Command Injection’) vulnerability

Credit:

The information has been provided by Miguel Mendez Z

The original article can be found at:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10146


Details

The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

 

Vulnerable Systems:

D-Link DIR-859 Wi-Fi router 1.05

D-Link DIR-859 Wi-Fi router 1.06B01 Beta01

 

CVE Information:

CVE-2019-17621

 

Disclosure Timeline:
Published Date:12/30/2019

Categories: FeaturedNews