PatchSiren cyber security CVE debrief
CVE-2019-17621 D-Link CVE debrief
CISA’s Known Exploited Vulnerabilities catalog lists CVE-2019-17621 as a command execution vulnerability affecting the D-Link DIR-859 Router. Because it is on the KEV list, defenders should treat it as urgent and follow vendor remediation guidance. If a fix is not available for the affected deployment, CISA advises discontinuing use of the product.
- Vendor
- D-Link
- Product
- DIR-859 Router
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2023-06-29
- Original CVE updated
- 2023-06-29
- Advisory published
- 2023-06-29
- Advisory updated
- 2023-06-29
Who should care
Network and security teams responsible for D-Link DIR-859 routers, especially if the device is deployed in small office, branch office, or internet-exposed environments.
Technical summary
The official corpus identifies CVE-2019-17621 as a command execution vulnerability in the D-Link DIR-859 Router. The source corpus does not include exploit mechanics, attack preconditions, or a CVSS score. CISA’s KEV entry indicates the issue is known to be exploited in the wild and directs affected users to apply vendor updates or discontinue use if updates are unavailable.
Defensive priority
Urgent. CISA has listed this CVE in the Known Exploited Vulnerabilities catalog, which indicates confirmed real-world exploitation and an elevated remediation priority.
Recommended defensive actions
- Identify whether any D-Link DIR-859 routers are in your environment.
- Apply vendor updates or follow D-Link’s published remediation instructions for affected devices.
- If updates are unavailable for your deployment, discontinue use of the product and replace it.
- Use the CISA KEV due date as a remediation target and verify completion across all sites and inventories.
Evidence notes
CISA’s KEV metadata for this entry names the vendor as D-Link, the product as DIR-859 Router, and the vulnerability as a command execution issue. The entry was added on 2023-06-29 with a due date of 2023-07-20 and specifies: apply updates per vendor instructions or discontinue use of the product if updates are unavailable. The supplied corpus also links to the CVE record and NVD detail page. No CVSS score or technical exploit details were provided in the corpus.
Official resources
-
CVE-2019-17621 CVE record
CVE.org
-
CVE-2019-17621 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
-
Source item URL
cisa_kev
Publicly documented in official vulnerability sources; CISA added the issue to its Known Exploited Vulnerabilities catalog on 2023-06-29. This debrief uses only the supplied official corpus and links.