CVE-2019-20501
HIGHDlink Dwl-2600ap Firmware < 4.2.0.15 - OS Command Injection
Title source: ruleDescription
D-Link DWL-2600AP 4.2.0.15 Rev A devices have an authenticated OS command injection vulnerability via the Upgrade Firmware functionality in the Web interface, using shell metacharacters in the admin.cgi?action=upgrade firmwareRestore or firmwareServerip parameter.
Exploits (1)
exploitdb
WORKING POC
by Raki Ben Hamouda · textwebappshardware
https://www.exploit-db.com/exploits/46841
References (2)
Core 2
Core References
Patch, Vendor Advisory x_refsource_misc
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/exploits/46841
Scores
CVSS v3
7.8
EPSS
0.1295
EPSS Percentile
94.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
dlink/dwl-2600ap_firmware
< 4.2.0.15
Published
Mar 05, 2020
Tracked Since
Feb 18, 2026