// For flags

CVE-2019-19356

Netis WF2419 Devices Remote Code Execution Vulnerability

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

5
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.

Netis WF2419 es vulnerable a la Ejecución de Código Remota (RCE) autenticada como root por medio de la página de administración Web del enrutador. La vulnerabilidad ha sido encontrada en la versión de firmware V1.2.31805 y V2.2.36123. Una vez conectado uno a esta página, es posible ejecutar comandos de sistema como root por medio de la herramienta de diagnóstico tracert debido a una falta de saneamiento de la entrada del usuario.

Netis WF2419 version 2.2.36123 suffers from a remote code execution vulnerability.

Netis WF2419 devices contains an unspecified vulnerability that allows an attacker to perform remote code execution as root through the router's web management page.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-11-27 CVE Reserved
  • 2020-02-07 CVE Published
  • 2020-03-02 First Exploit
  • 2021-11-03 Exploited in Wild
  • 2022-05-03 KEV Due Date
  • 2025-02-04 CVE Updated
  • 2025-03-30 EPSS Updated
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netis-systems
Search vendor "Netis-systems"
Wf2419 Firmware
Search vendor "Netis-systems" for product "Wf2419 Firmware"
1.2.31805
Search vendor "Netis-systems" for product "Wf2419 Firmware" and version "1.2.31805"
-
Affected
in Netis-systems
Search vendor "Netis-systems"
Wf2419
Search vendor "Netis-systems" for product "Wf2419"
--
Safe
Netis-systems
Search vendor "Netis-systems"
Wf2419 Firmware
Search vendor "Netis-systems" for product "Wf2419 Firmware"
2.2.36123
Search vendor "Netis-systems" for product "Wf2419 Firmware" and version "2.2.36123"
-
Affected
in Netis-systems
Search vendor "Netis-systems"
Wf2419
Search vendor "Netis-systems" for product "Wf2419"
--
Safe