Overview
D-Link DWL-2600AP access point contains an authenticated command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113; https://nvd.nist.gov/vuln/detail/CVE-2019-20500
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2019-20500 |
| Vendor / Product | D-Link — DWL-2600AP Access Point |
| NVD Published | 2020-03-05 |
| NVD Last Modified | 2025-11-07 |
| CVSS 3.1 Score | 7.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-78 |
| CISA KEV Added | 2023-06-29 |
| CISA KEV Deadline | 2023-07-20 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2023-07-20.
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Timeline
| Date | Event |
|---|---|
| 2023-06-29 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2023-07-20 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2019-20500 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |