Exploited
8.5
CWE
78
Advisory Published
Updated

CVE-2019-19356: Netis WF2419 Devices Remote Code Execution Vulnerability

First published: Fri Feb 07 2020(Updated: )

Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Netis WF2419 Devices=1.2.31805
Netis WF2419 Devices=2.2.36123
Netis-systems Wf2419
Netis WF2419 Devices
All of
Any of
Netis-systems Wf2419 Firmware=1.2.31805
Netis-systems Wf2419 Firmware=2.2.36123
Netis-systems Wf2419

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-19356?

    CVE-2019-19356 is a vulnerability that allows authenticated remote code execution as root through the router Web management page on Netis WF2419 Devices.

  • What is the severity of CVE-2019-19356?

    CVE-2019-19356 has a severity rating of 7.5 (high).

  • Which software versions are affected by CVE-2019-19356?

    CVE-2019-19356 affects firmware version V1.2.31805 and V2.2.36123 of the Netis WF2419 Devices.

  • How can I exploit CVE-2019-19356?

    To exploit CVE-2019-19356, you need to establish an authenticated connection to the router Web management page.

  • Is there a fix for CVE-2019-19356?

    To fix CVE-2019-19356, it is recommended to update the firmware of the Netis WF2419 Devices to a secure version.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203