Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-17621

Description

The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

POC

Reference

- http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html

- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104

- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9

- https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104

- https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9

Github

- https://github.com/ARPSyndicate/cvemon

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Squirre17/CVE-2019-17621

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/Vu1nT0tal/IoT-vulhub

- https://github.com/VulnTotal-Team/IoT-vulhub

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/attilaszia/linux-iot-cves

- https://github.com/doudoudedi/hackEmbedded

- https://github.com/firmianay/IoT-vulhub

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/liyansong2018/firmware-analysis-plus

- https://github.com/password520/Penetration_PoC

- https://github.com/pen4uin/awesome-vulnerability-research

- https://github.com/pen4uin/vulnerability-research

- https://github.com/pen4uin/vulnerability-research-list

- https://github.com/pentration/gongkaishouji

- https://github.com/s1kr10s/D-Link-DIR-859-RCE

- https://github.com/secenv/GoInputProxy

- https://github.com/secnotes/firmware-analysis-plus

- https://github.com/tanjiti/sec_profile

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji