First published: Mon Sep 16 2019(Updated: )
The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dns-320 Firmware | <=2.05.b10 | |
Dlink Dns-320 | ||
D-Link DNS-320 Storage Device | ||
All of | ||
Dlink Dns-320 Firmware | <=2.05.b10 | |
Dlink Dns-320 |
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16057 is classified as a critical vulnerability due to its potential for remote code execution.
CVE-2019-16057 allows remote attackers to execute arbitrary commands on D-Link DNS-320 devices running vulnerable firmware.
To mitigate CVE-2019-16057, update the firmware of the D-Link DNS-320 to the latest available version beyond 2.05.B10.
Your D-Link DNS-320 device is vulnerable to CVE-2019-16057 if it is running firmware version 2.05.B10 or lower.
Exploitation of CVE-2019-16057 can lead to unauthorized access and complete control over the affected D-Link DNS-320 device.