First published: Fri Feb 07 2020(Updated: )
Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netis WF2419 Devices | =1.2.31805 | |
Netis WF2419 Devices | =2.2.36123 | |
Netis-systems Wf2419 | ||
Netis WF2419 Devices | ||
All of | ||
Any of | ||
Netis-systems Wf2419 Firmware | =1.2.31805 | |
Netis-systems Wf2419 Firmware | =2.2.36123 | |
Netis-systems Wf2419 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19356 is a vulnerability that allows authenticated remote code execution as root through the router Web management page on Netis WF2419 Devices.
CVE-2019-19356 has a severity rating of 7.5 (high).
CVE-2019-19356 affects firmware version V1.2.31805 and V2.2.36123 of the Netis WF2419 Devices.
To exploit CVE-2019-19356, you need to establish an authenticated connection to the router Web management page.
To fix CVE-2019-19356, it is recommended to update the firmware of the Netis WF2419 Devices to a secure version.