⚠ Actively exploited
Added to CISA KEV on 2023-06-29. Federal agencies required to patch by 2023-07-20. Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable..

CVE-2019-20500OS Command Injection in Dlink Dwl-2600ap Firmware

Severity
7.8HIGHNVD
EPSS
92.5%
top 0.27%
CISA KEV
KEV
Added 2023-06-29
Due 2023-07-20
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMar 5
KEV addedJun 29
KEV dueJul 20
Latest updateNov 7
CISA Required Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Description

D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-xx29-p5f4-mwr8: D-Link DWL-2600AP 42022-05-24
CVEList
CVE-2019-20500: D-Link DWL-2600AP 42020-03-05
VulnCheck
D-Link DWL-2600AP Access Point Command Injection Vulnerability2019

💥Exploits & PoCs

1
Exploit-DB
D-Link DWL-2600AP - Multiple OS Command Injection2019-05-14

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS D-Link DWL-2600AP Command Injection Attempt (CVE-2019-20499, CVE-2019-20500, CVE-2019-20501)2024-11-07

📋Vendor Advisories

1
CISA
D-Link DWL-2600AP Access Point Command Injection Vulnerability2023-06-29

🕵️Threat Intelligence

2
Unit42
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits2023-06-22
Unit42
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits2023-06-22
CVE-2019-20500 — OS Command Injection in Dlink | cvebase