';
}
else{
echo '';
}
echo '
Hillstone Networks';
} elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") {
echo '';
echo 'huaantech';
} elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") {
echo '';
echo 'dcnetworks';
} elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") {
if (false===strpos($_SERVER[REQUEST_URI],"/en/"))
echo '';
else
echo '';
echo 'w-ibeda';
} elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") {
echo '';
echo 'hp-telecom';
} elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") {
echo '';
echo 'Maipu';
} elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") {
echo '';
echo 'Ncurity';
} elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") {
echo '';
echo 'Socusnetwork';
} else{
echo '';
echo 'Hillstone Networks';
}
?>
vul_app:dlink_dns_320_rce_vulnerability(Rule ID:1070210395)
Release Date:2025/9/15
Rule Name:CVE-2019-16057:DLink DNS 320 Remote Code Execution Vulnerability
Severity:critical
CVE ID:CVE-2019-16057
The login_mgr.cgi script in D-Link DNS-320 through 2.05.B10 is vulnerable to remote command injection.
Other reference:None
Update vendor patches.