
CVE-2019-19356 – Netis WF2419 Devices Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2019-19356
07 Feb 2020 — Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing. Netis WF2419 es vulnerable a la Ejecución de Código Remota (RCE) autenticada como root por medio de la página de administración Web del enrutador. ... • https://packetstorm.news/files/id/156588 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2018-6391
https://notcve.org/view.php?id=CVE-2018-6391
29 Jan 2018 — A cross-site request forgery web vulnerability has been discovered on Netis WF2419 V2.2.36123 devices. A remote attacker is able to delete Address Reservation List settings. Se ha descubierto una vulnerabilidad web de Cross-Site Request Forgery (CSRF) en dispositivos Netis WF2419 V2.2.36123. Un atacante remoto puede eliminar opciones de Address Reservation List. • https://0day.today/exploit/29659 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2018-5967
https://notcve.org/view.php?id=CVE-2018-5967
25 Jan 2018 — Netis WF2419 V2.2.36123 devices allow XSS via the Description parameter on the Bandwidth Control Rule Settings page. Los dispositivos Netis WF2419 V2.2.36123 permiten Cross-Site Scripting (XSS) mediante el parámetro Description en la página Bandwidth Control Rule Settings. • https://packetstormsecurity.com/files/145513/Netis-WF2419-HTML-Injection.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •