First published: Wed Jan 29 2020(Updated: )
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-859 Firmware | =1.05 | |
Dlink Dir-859 Firmware | =1.06b01-beta01 | |
Dlink Dir-859 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-20217 is critical with a severity value of 9.8.
Remote attackers can exploit CVE-2019-20217 by executing arbitrary OS commands via the urn: in the M-SEARCH method in ssdpcgi() in /htdocs/cgibin.
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices are affected by CVE-2019-20217.
To fix CVE-2019-20217, update the firmware of D-Link DIR-859 devices to version 1.07 or later.
Yes, you can find additional information about CVE-2019-20217 in the provided references.