CVE-2019-20499
HIGHDlink Dwl-2600ap Firmware < 4.2.0.15 - OS Command Injection
Title source: ruleDescription
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Restore Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_restore configRestore or configServerip parameter.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/48274
exploitdb
WORKING POC
by Raki Ben Hamouda · textwebappshardware
https://www.exploit-db.com/exploits/46841
metasploit
WORKING POC
EXCELLENT
by RAKI BEN HAMOUDA, Nick Starke · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/dlink_dwl_2600_command_injection.rb
References (3)
Scores
CVSS v3
7.8
EPSS
0.8885
EPSS Percentile
99.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
dlink/dwl-2600ap_firmware
< 4.2.0.15
Published
Mar 05, 2020
Tracked Since
Feb 18, 2026