Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.
Published 2020-02-07 23:15:10
Updated 2022-01-01 19:57:27
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Execute code

Products affected by CVE-2019-19356

CVE-2019-19356 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Netis WF2419 Devices Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Netis WF2419 devices contains an unspecified vulnerability that allows an attacker to perform remote code execution as root through the router's web management page.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2019-19356
Added on 2021-11-03 Action due date 2022-05-03

Exploit prediction scoring system (EPSS) score for CVE-2019-19356

95.97%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2019-19356

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
8.5
HIGH AV:N/AC:M/Au:S/C:C/I:C/A:C
6.8
10.0
NIST
7.5
HIGH CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1.6
5.9
NIST

CWE ids for CVE-2019-19356

References for CVE-2019-19356

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!