ID

VAR-201907-0365


CVE

CVE-2019-13128


TITLE

D-Link DIR-823G Command injection vulnerability in device firmware

Trust: 0.8

sources: JVNDB: JVNDB-2019-006084

DESCRIPTION

An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the IPAddress or Gateway field to SetStaticRouteSettings. D-Link DIR-823G The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-823G is a wireless router from D-Link Corporation of Taiwan, China. A command injection vulnerability exists in HNAP1 in D-LinkDIR-823G using firmware version 1.02B03. The vulnerability stems from the fact that external input data constructs executable commands, and the network system or product does not properly filter the special elements. An attacker could exploit the vulnerability to execute an illegal command

Trust: 2.34

sources: NVD: CVE-2019-13128 // JVNDB: JVNDB-2019-006084 // CNVD: CNVD-2019-20996 // VULHUB: VHN-144943 // VULMON: CVE-2019-13128

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['network device']sub_category:router

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-20996

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-823gscope:eqversion:1.02b03

Trust: 1.0

vendor:d linkmodel:dir-823gscope:eqversion:1.02b03

Trust: 0.8

vendor:d linkmodel:dir-823g 1.02b03scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-20996 // JVNDB: JVNDB-2019-006084 // NVD: CVE-2019-13128

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-13128
value: HIGH

Trust: 1.0

NVD: CVE-2019-13128
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-20996
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201907-005
value: HIGH

Trust: 0.6

VULHUB: VHN-144943
value: HIGH

Trust: 0.1

VULMON: CVE-2019-13128
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-13128
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-20996
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-144943
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-13128
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-20996 // VULHUB: VHN-144943 // VULMON: CVE-2019-13128 // JVNDB: JVNDB-2019-006084 // CNNVD: CNNVD-201907-005 // NVD: CVE-2019-13128

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-144943 // JVNDB: JVNDB-2019-006084 // NVD: CVE-2019-13128

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-005

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201907-005

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006084

PATCH

title:Top Pageurl:http://www.dlink.lt/en/

Trust: 0.8

title:vulnerability-laburl:https://github.com/pen4uin/vulnerability-lab

Trust: 0.1

title:Vulnerability_Researchurl:https://github.com/pen4uin/Vulnerability_Research

Trust: 0.1

title: - url:https://github.com/pen4uin/awesome-vulnerability-research

Trust: 0.1

title: - url:https://github.com/pen4uin/vulnerability-research-list

Trust: 0.1

title:SecBooksurl:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

sources: VULMON: CVE-2019-13128 // JVNDB: JVNDB-2019-006084

EXTERNAL IDS

db:NVDid:CVE-2019-13128

Trust: 3.3

db:JVNDBid:JVNDB-2019-006084

Trust: 0.8

db:CNVDid:CNVD-2019-20996

Trust: 0.6

db:CNNVDid:CNNVD-201907-005

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-144943

Trust: 0.1

db:VULMONid:CVE-2019-13128

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-20996 // VULHUB: VHN-144943 // VULMON: CVE-2019-13128 // JVNDB: JVNDB-2019-006084 // CNNVD: CNNVD-201907-005 // NVD: CVE-2019-13128

REFERENCES

url:https://github.com/teamseri0us/pocs/blob/master/iot/dlink/dir-823g-v2.pdf

Trust: 2.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13128

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-13128

Trust: 1.4

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/pen4uin/vulnerability-lab

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2019-20996 // VULHUB: VHN-144943 // VULMON: CVE-2019-13128 // JVNDB: JVNDB-2019-006084 // CNNVD: CNNVD-201907-005 // NVD: CVE-2019-13128

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2019-20996
db:VULHUBid:VHN-144943
db:VULMONid:CVE-2019-13128
db:JVNDBid:JVNDB-2019-006084
db:CNNVDid:CNNVD-201907-005
db:NVDid:CVE-2019-13128

LAST UPDATE DATE

2025-01-30T21:24:31.434000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-20996date:2019-07-03T00:00:00
db:VULHUBid:VHN-144943date:2020-08-24T00:00:00
db:VULMONid:CVE-2019-13128date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2019-006084date:2019-07-09T00:00:00
db:CNNVDid:CNNVD-201907-005date:2020-10-28T00:00:00
db:NVDid:CVE-2019-13128date:2024-11-21T04:24:15.240

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-20996date:2019-07-03T00:00:00
db:VULHUBid:VHN-144943date:2019-07-01T00:00:00
db:VULMONid:CVE-2019-13128date:2019-07-01T00:00:00
db:JVNDBid:JVNDB-2019-006084date:2019-07-09T00:00:00
db:CNNVDid:CNNVD-201907-005date:2019-07-01T00:00:00
db:NVDid:CVE-2019-13128date:2019-07-01T15:15:11.757