TopVuln

High-risk vulnerability digests

CVE-2019-20500

  • KEV

D-Link DWL-2600AP Access Point Command Injection Vulnerability

Details

CISA date
2023-06-29
Affected versions
DWL-2600AP Access Point
Summary
D-Link DWL-2600AP access point contains an authenticated command injection vulnerability via the Save Configuration functionality in the Web interface, using shell metacharacters in the admin.cgi?action=config_save configBackup or downloadServerip parameter.
Remediation
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Exploit info
No exploit-tagged NVD references in our cache; see the CISA KEV link below.

View on NVD  ·  CISA KEV catalog

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.