LIVE NEWSROOM · --:-- · May 25, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CVE DATABASE  /  CVE-2019-17621

CVE-2019-17621

D-Link DIR-859 Router Command Execution Vulnerability

CVSS 9.8 · CRITICAL ⚠ CISA KEV — ACTIVELY EXPLOITED
On the CISA KEV catalog

Confirmed exploited in the wild. Added 2023-06-29. Federal remediation due 2023-07-20.
Required action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Summary

The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

CVSS 3.1 breakdown

Base score9.8 (CRITICAL)
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack vectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityHIGH
IntegrityHIGH
AvailabilityHIGH

Weakness type (CWE)

Affected products

Dlink dir-859 firmwareDlink dir-859Dlink dir-822 firmwareDlink dir-822Dlink dir-823 firmwareDlink dir-823Dlink dir-865l firmwareDlink dir-865lDlink dir-868l firmwareDlink dir-868lDlink dir-869 firmwareDlink dir-869Dlink dir-880l firmwareDlink dir-880lDlink dir-890l firmwareDlink dir-890lDlink dir-890r firmwareDlink dir-890rDlink dir-885l firmwareDlink dir-885l
Check this CVE live

Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.

References

Data: NIST NVD + CISA KEV. NVD last modified 2025-11-07. Always verify against the vendor advisory before acting.

Scroll to Top