CVE-2019-20500

D-Link DWL-2600AP Access Point — D-Link DWL-2600AP Access Point Command Injection Vulnerability
⚠️ CVSS 3.1  7.8 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

D-Link DWL-2600AP access point contains an authenticated command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.

https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113; https://nvd.nist.gov/vuln/detail/CVE-2019-20500

Key Details

PropertyValue
CVE ID CVE-2019-20500
Vendor / Product D-Link — DWL-2600AP Access Point
NVD Published2020-03-05
NVD Last Modified2025-11-07
CVSS 3.1 Score7.8
CVSS 3.1 VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-78
CISA KEV Added2023-06-29
CISA KEV Deadline2023-07-20
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2023-07-20. Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Timeline

DateEvent
2023-06-29Added to CISA Known Exploited Vulnerabilities catalog
2023-07-20CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2019-20500 Vulnerability Database
CISA KEV Catalog Entry US Government