First published: Thu Mar 05 2020(Updated: )
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Restore Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_restore configRestore or configServerip parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dwl-2600ap Firmware | <=4.2.0.15 | |
Dlink Dwl-2600ap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20499 is an authenticated OS command injection vulnerability in D-Link DWL-2600AP 4.2.0.15 Rev A devices.
CVE-2019-20499 has a severity rating of 7.8 (high).
The vulnerability in CVE-2019-20499 allows an authenticated user to execute malicious OS commands via the Restore Configuration functionality in the Web interface.
D-Link DWL-2600AP 4.2.0.15 Rev A devices are affected by CVE-2019-20499.
Yes, here are some references for CVE-2019-20499: http://packetstormsecurity.com/files/156952/DLINK-DWL-2600-Authenticated-Remote-Command-Injection.html, https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113, https://www.exploit-db.com/exploits/46841