CVE-2019-17621

D-Link DIR-859 Router — D-Link DIR-859 Router Command Execution Vulnerability
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

D-Link DIR-859 router contains a command execution vulnerability in the UPnP endpoint URL, /gena.cgi. Exploitation allows an unauthenticated remote attacker to execute system commands as root by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147; https://nvd.nist.gov/vuln/detail/CVE-2019-17621

Key Details

PropertyValue
CVE ID CVE-2019-17621
Vendor / Product D-Link — DIR-859 Router
NVD Published2019-12-30
NVD Last Modified2025-11-07
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-78
CISA KEV Added2023-06-29
CISA KEV Deadline2023-07-20
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2023-07-20. Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Timeline

DateEvent
2023-06-29Added to CISA Known Exploited Vulnerabilities catalog
2023-07-20CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2019-17621 Vulnerability Database
CISA KEV Catalog Entry US Government