### [CVE-2019-17621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17621) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The UPnP endpoint URL /gena.cgi in the D-Link DIR-859 Wi-Fi router 1.05 and 1.06B01 Beta01 allows an Unauthenticated remote attacker to execute system commands as root, by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network. ### POC #### Reference - http://packetstormsecurity.com/files/156054/D-Link-DIR-859-Unauthenticated-Remote-Command-Execution.html - https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104 - https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-es-fad716629ff9 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CnHack3r/Penetration_PoC - https://github.com/EchoGin404/- - https://github.com/EchoGin404/gongkaishouji - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/SexyBeast233/SecBooks - https://github.com/Squirre17/CVE-2019-17621 - https://github.com/Tyro-Shan/gongkaishouji - https://github.com/Vu1nT0tal/IoT-vulhub - https://github.com/VulnTotal-Team/IoT-vulhub - https://github.com/YIXINSHUWU/Penetration_Testing_POC - https://github.com/ZTK-009/Penetration_PoC - https://github.com/doudoudedi/hackEmbedded - https://github.com/firmianay/IoT-vulhub - https://github.com/hasee2018/Penetration_Testing_POC - https://github.com/huike007/penetration_poc - https://github.com/huike007/poc - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/liyansong2018/firmware-analysis-plus - https://github.com/password520/Penetration_PoC - https://github.com/pen4uin/awesome-vulnerability-research - https://github.com/pen4uin/vulnerability-research - https://github.com/pen4uin/vulnerability-research-list - https://github.com/s1kr10s/D-Link-DIR-859-RCE - https://github.com/secenv/GoInputProxy - https://github.com/tanjiti/sec_profile - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/yedada-wei/- - https://github.com/yedada-wei/gongkaishouji