ID

VAR-201909-1437


CVE

CVE-2019-10891


TITLE

D-link DIR-806 Device code injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-009049

DESCRIPTION

An issue was discovered in D-Link DIR-806 devices. There is a command injection in function hnap_main, which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header. D-link DIR-806 The device contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-806 is a wireless router from Taiwan D-Link. A code injection vulnerability exists in D-Link DIR-806

Trust: 2.25

sources: NVD: CVE-2019-10891 // JVNDB: JVNDB-2019-009049 // CNVD: CNVD-2019-39555 // VULHUB: VHN-142483

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-39555

AFFECTED PRODUCTS

vendor:d linkmodel:dir-806scope: - version: -

Trust: 1.4

vendor:dlinkmodel:dir-806scope:eqversion: -

Trust: 1.0

sources: CNVD: CNVD-2019-39555 // JVNDB: JVNDB-2019-009049 // NVD: CVE-2019-10891

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-10891
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-10891
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-39555
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201909-255
value: CRITICAL

Trust: 0.6

VULHUB: VHN-142483
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-10891
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-39555
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-142483
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-10891
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-10891
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-39555 // VULHUB: VHN-142483 // JVNDB: JVNDB-2019-009049 // CNNVD: CNNVD-201909-255 // NVD: CVE-2019-10891

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-94

Trust: 0.9

sources: VULHUB: VHN-142483 // JVNDB: JVNDB-2019-009049 // NVD: CVE-2019-10891

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201909-255

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201909-255

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009049

PATCH

title:Top Pageurl:https://www.dlink.com/en/

Trust: 0.8

sources: JVNDB: JVNDB-2019-009049

EXTERNAL IDS

db:NVDid:CVE-2019-10891

Trust: 3.1

db:JVNDBid:JVNDB-2019-009049

Trust: 0.8

db:CNNVDid:CNNVD-201909-255

Trust: 0.7

db:CNVDid:CNVD-2019-39555

Trust: 0.6

db:NSFOCUSid:44332

Trust: 0.6

db:VULHUBid:VHN-142483

Trust: 0.1

sources: CNVD: CNVD-2019-39555 // VULHUB: VHN-142483 // JVNDB: JVNDB-2019-009049 // CNNVD: CNNVD-201909-255 // NVD: CVE-2019-10891

REFERENCES

url:https://github.com/kirin-say/vulnerabilities/blob/master/dir-806_code_injection.md

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10891

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-10891

Trust: 0.8

url:http://www.nsfocus.net/vulndb/44332

Trust: 0.6

sources: CNVD: CNVD-2019-39555 // VULHUB: VHN-142483 // JVNDB: JVNDB-2019-009049 // CNNVD: CNNVD-201909-255 // NVD: CVE-2019-10891

CREDITS

vendor

Trust: 0.6

sources: CNNVD: CNNVD-201909-255

SOURCES

db:CNVDid:CNVD-2019-39555
db:VULHUBid:VHN-142483
db:JVNDBid:JVNDB-2019-009049
db:CNNVDid:CNNVD-201909-255
db:NVDid:CVE-2019-10891

LAST UPDATE DATE

2024-08-14T14:51:03.449000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-39555date:2019-11-07T00:00:00
db:VULHUBid:VHN-142483date:2019-10-02T00:00:00
db:JVNDBid:JVNDB-2019-009049date:2019-09-11T00:00:00
db:CNNVDid:CNNVD-201909-255date:2022-04-19T00:00:00
db:NVDid:CVE-2019-10891date:2022-04-18T16:12:49.133

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-39555date:2019-11-07T00:00:00
db:VULHUBid:VHN-142483date:2019-09-06T00:00:00
db:JVNDBid:JVNDB-2019-009049date:2019-09-11T00:00:00
db:CNNVDid:CNNVD-201909-255date:2019-09-06T00:00:00
db:NVDid:CVE-2019-10891date:2019-09-06T20:15:11.003