First published: Thu Mar 05 2020(Updated: )
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Upgrade Firmware functionality in the Web interface, using shell metacharacters in the admin.cgi?action=upgrade firmwareRestore or firmwareServerip parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DWL-2600AP | <=4.2.0.15 | |
D-Link DWL-2600AP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20501 is classified as a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2019-20501, update the D-Link DWL-2600AP firmware to the latest version beyond 4.2.0.15.
CVE-2019-20501 affects D-Link DWL-2600AP devices running firmware version 4.2.0.15 or earlier.
The impact of CVE-2019-20501 includes the possibility of unauthorized remote command execution on the affected D-Link devices.
Yes, exploiting CVE-2019-20501 requires authenticated access to the web interface of the device.