10
CVSSv2

CVE-2019-16057

Published: 16/09/2019 Updated: 16/09/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The login_mgr.cgi script in D-Link DNS-320 up to and including 2.05.B10 is vulnerable to remote command injection.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dns-320_firmware

Github Repositories

Python Script for Extracting Information regarding a CVE with different filtering options and Output options.

#CVE-information-Extractor SETUP: -> pip3 install requirementstxt -> copy the required_files folder and extractpy to your current working directory -> python3 extractpy INPUT: This script takes all the CVEs from 'Jan 31 CVEsxlsx' as input and compares it with 'APT Groupsxlsx','Exploit-DB Master Scrapexlsx','NVD Updat

Recent Articles

Microsoft changes encryption, another D-Link bug, phishing dangers, and more
The Register • Shaun Nichols in San Francisco • 30 Sep 2019

Plus, Baltimore's disastrous ransomware infection and worse IT practices

Roundup Let's look at some of the latest security news you may have missed this week. This year's ransomware infection at the City of Baltimore made headlines, in part because of the eye-popping $18.2m price tag its damage and recovery bills racked up. It turns out that the city's bad data collection policies are playing a big role in that. The Baltimore Sun reports that one of the reasons the data loss from the infection was so severe was because many of the important files were being kept loca...