First published: Thu Aug 01 2019(Updated: )
An issue was discovered on D-Link 6600-AP and DWL-3600AP Ax 4.2.0.14 21/03/2019 devices. There is an ability to escape to a shell in the restricted command line interface, as demonstrated by the `/bin/sh -c wget` sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink 6600-ap Firmware | =4.2.0.14 | |
Dlink 6600-ap | ||
Dlink Dwl-3600ap Firmware | =4.2.0.14 | |
Dlink Dwl-3600ap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14337 is considered a high-severity vulnerability due to the potential for unauthorized access to the shell.
To fix CVE-2019-14337, you should update your D-Link 6600-AP or DWL-3600AP firmware to the latest version available.
CVE-2019-14337 affects D-Link 6600-AP and DWL-3600AP devices running firmware version 4.2.0.14.
CVE-2019-14337 is a command injection vulnerability that allows escaping to a shell from a restricted command line interface.
Yes, CVE-2019-14337 can potentially lead to further attacks by allowing an attacker to execute arbitrary commands on the affected device.