Логотип exploitDog
bind:CVE-2019-19356
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19356

Количество 3

Количество 3

nvd логотип

CVE-2019-19356

около 6 лет назад

Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-ch88-rxpc-5c5r

больше 3 лет назад

Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.

CVSS3: 7.5
EPSS: Критический
fstec логотип

BDU:2021-05698

больше 6 лет назад

Уязвимость реализации команд ping и tracert веб-интерфейса управления микропрограммного обеспечения маршрутизаторов Netis WF2419, позволяющая нарушителю выполнять произвольные команды и получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-19356

Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.

CVSS3: 7.5
91%
Критический
около 6 лет назад
github логотип
GHSA-ch88-rxpc-5c5r

Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.

CVSS3: 7.5
91%
Критический
больше 3 лет назад
fstec логотип
BDU:2021-05698

Уязвимость реализации команд ping и tracert веб-интерфейса управления микропрограммного обеспечения маршрутизаторов Netis WF2419, позволяющая нарушителю выполнять произвольные команды и получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
больше 6 лет назад

Уязвимостей на страницу