Security experts at Fortinet’s FortiGuard Labs disclosed a remote code execution vulnerability tracked as CVE-2019-16920. The vulnerability is an
The bad news for the users is that the vendor will not address it because it affects discontinued products.
According to the Fortinet, the vulnerability impacts D-Link firmware in the DIR-655, DIR-866L, DIR-652, and DHP-1565 router families.
“In September 2019, Fortinet’s FortiGuard Labs discovered and reported an
The vulnerability could be exploited by an attacker sending arbitrary input to a “
“The vulnerability begins with a bad authentication check. To see the problem in action, we start at the admin page and then perform a login action.” continues the advisory. “Here, we implement the POST HTTP Request to “apply_sec.cgi” with the action ping_test. We then perform the command injection in ping_ipaddr. Even if it returns the login page, the action ping_test is still performed – the value of ping_ipaddr will execute the “echo 1234” command
The experts discovered that it is possible to execute code remotely, even without the necessary privileges, due to bad authentication check.
The researchers reported the vulnerability to D-Link on September 22, the vendor the day after acknowledged the issue, but three days later confirmed that no patch will be released because the products are at
Below the disclosure timeline:
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – routers, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]