INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 3h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 3h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 3h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h
Vulnerabilities

CVE-2019-17621

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
D-Link DIR-859 Router Command Execution Vulnerability — D-Link DIR-859 router contains a command execution vulnerability in the UPnP endpoint URL, /gena.cgi. Exploitation allows an unauthenticated rem
Published: Jun 29, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

D-Link DIR-859 Router Command Execution Vulnerability — D-Link DIR-859 router contains a command execution vulnerability in the UPnP endpoint URL, /gena.cgi. Exploitation allows an unauthenticated remote attacker to execute system commands as root by sending a specially crafted HTTP SUBSCRIBE request to the UPnP service when connecting to the local network.

🤖 AI Executive Summary

CVE-2019-17621 is a critical unauthenticated remote command execution vulnerability in D-Link DIR-859 routers, exploitable via a crafted HTTP SUBSCRIBE request to the UPnP endpoint (/gena.cgi). An attacker with local network access can execute arbitrary system commands as root without any authentication, achieving full device compromise. This vulnerability has a public exploit available, significantly lowering the barrier for threat actors. Given the widespread deployment of D-Link routers in home offices, SMEs, and branch networks across Saudi Arabia, this represents an urgent patching priority.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 14, 2026 23:54
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations across multiple sectors face significant risk due to widespread D-Link DIR-859 deployment in branch offices, SME environments, and remote worker setups. Banking and financial institutions regulated by SAMA may face network perimeter breaches if these routers are used in branch or ATM network segments. Government entities under NCA oversight using these devices in administrative offices risk lateral movement attacks post-exploitation. Energy sector companies including ARAMCO subsidiaries with operational technology (OT) adjacent networks using consumer-grade routers for remote sites face potential pivot points into critical infrastructure. Telecom providers such as STC and Zain distributing these routers to residential and SME customers amplify the attack surface. The availability of a public exploit makes this particularly dangerous for Saudi organizations with limited SOC visibility into edge network devices.
🏢 Affected Saudi Sectors
Banking Government Energy Telecom Healthcare Education Retail SME
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all D-Link DIR-859 devices across the network using asset inventory tools or network scanning (nmap -p 1900 --script upnp-info).
2. Disable UPnP service immediately on all affected routers via the admin interface (Advanced > UPnP > Disable) as a compensating control.
3. Block inbound and outbound traffic on UPnP port 1900/UDP and 2869/TCP at the network perimeter and internal firewall segments.

PATCHING GUIDANCE:
4. Apply the latest firmware update provided by D-Link for DIR-859. Check https://support.dlink.com for the most current firmware version.
5. If the device is end-of-life and no patch is available, plan immediate hardware replacement with a supported device.
6. After patching, verify UPnP is disabled or restricted to trusted internal segments only.

COMPENSATING CONTROLS:
7. Implement network segmentation to isolate routers from critical internal systems.
8. Deploy IDS/IPS rules to detect HTTP SUBSCRIBE requests targeting /gena.cgi (Snort/Suricata rule: alert tcp any any -> any 49152:65535 (msg:'D-Link DIR-859 UPnP RCE Attempt'; content:'SUBSCRIBE'; content:'/gena.cgi'; nocase; sid:9000001;)).
9. Enable logging on network devices and forward logs to SIEM for anomaly detection.
10. Restrict management access to routers via ACLs, allowing only trusted admin IPs.

DETECTION:
11. Monitor for unusual outbound connections from router IP addresses.
12. Alert on HTTP SUBSCRIBE methods in proxy/firewall logs targeting internal IP ranges.
13. Check for unauthorized configuration changes or new admin accounts on routers.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة D-Link DIR-859 عبر الشبكة باستخدام أدوات جرد الأصول أو فحص الشبكة (nmap -p 1900 --script upnp-info).
2. تعطيل خدمة UPnP فوراً على جميع أجهزة التوجيه المتأثرة عبر واجهة المسؤول (Advanced > UPnP > Disable) كإجراء تعويضي.
3. حجب حركة المرور الواردة والصادرة على منفذ UPnP 1900/UDP و2869/TCP على محيط الشبكة وقطاعات جدار الحماية الداخلية.

إرشادات التصحيح:
4. تطبيق آخر تحديث للبرنامج الثابت (Firmware) المقدم من D-Link لجهاز DIR-859 من خلال الموقع الرسمي https://support.dlink.com.
5. إذا كان الجهاز قد انتهت دورة دعمه ولا يتوفر تصحيح، يجب التخطيط الفوري لاستبداله بجهاز مدعوم.
6. بعد التصحيح، التحقق من تعطيل UPnP أو تقييده على القطاعات الداخلية الموثوقة فقط.

ضوابط التعويض:
7. تطبيق تجزئة الشبكة لعزل أجهزة التوجيه عن الأنظمة الداخلية الحيوية.
8. نشر قواعد IDS/IPS للكشف عن طلبات HTTP SUBSCRIBE التي تستهدف /gena.cgi.
9. تفعيل التسجيل على أجهزة الشبكة وإرسال السجلات إلى نظام SIEM للكشف عن الشذوذ.
10. تقييد الوصول الإداري لأجهزة التوجيه عبر قوائم التحكم بالوصول (ACL) للسماح فقط لعناوين IP الموثوقة.

الكشف:
11. مراقبة الاتصالات الصادرة غير المعتادة من عناوين IP الخاصة بأجهزة التوجيه.
12. التنبيه على أساليب HTTP SUBSCRIBE في سجلات الوكيل/جدار الحماية التي تستهدف نطاقات IP الداخلية.
13. التحقق من التغييرات غير المصرح بها في الإعدادات أو الحسابات الإدارية الجديدة على أجهزة التوجيه.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Asset Management — Network devices must be inventoried and maintained ECC-2-3-1: Network Security — Disable unnecessary services including UPnP ECC-2-3-3: Network Segmentation — Isolate critical systems from vulnerable edge devices ECC-2-6-1: Vulnerability Management — Apply security patches within defined timelines ECC-3-3-1: Secure Configuration — Harden network device configurations
🔵 SAMA CSF
3.3.6 — Vulnerability Management: Timely identification and remediation of vulnerabilities in network infrastructure 3.3.7 — Patch Management: Apply firmware patches to network devices 3.3.2 — Network Security Controls: Disable insecure protocols and services 3.3.4 — Secure Configuration Management: Enforce hardened configurations on all network devices 3.4.1 — Cyber Incident Management: Detect and respond to exploitation attempts
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities: Patch firmware on affected routers A.8.20 — Networks security: Disable UPnP and segment networks A.8.9 — Configuration management: Enforce secure baseline configurations A.8.16 — Monitoring activities: Detect anomalous traffic patterns from routers A.5.30 — ICT readiness for business continuity: Replace EoL devices
🟣 PCI DSS v4.0
Requirement 1.3 — Network access controls: Restrict inbound/outbound traffic on UPnP ports Requirement 6.3 — Security vulnerabilities: Apply available patches within one month for critical vulnerabilities Requirement 2.2 — System configuration standards: Disable UPnP and unnecessary services Requirement 10.4 — Log and monitor: Monitor router logs for exploitation indicators
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
D-Link:DIR-859 Router
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.01%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-07-20
Published 2023-06-29
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.