{"api_version":"1","generated_at":"2026-04-23T02:34:00+00:00","cve":"CVE-2019-3985","urls":{"html":"https://cve.report/CVE-2019-3985","api":"https://cve.report/api/cve/CVE-2019-3985.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-3985","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-3985"},"summary":{"title":"CVE-2019-3985","description":"Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when configuring the devices wifi configuration via the ssid parameter.","state":"PUBLIC","assigner":"vulnreport@tenable.com","published_at":"2019-12-11 23:15:00","updated_at":"2019-12-13 21:05:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://www.tenable.com/security/research/tra-2019-51","name":"https://www.tenable.com/security/research/tra-2019-51","refsource":"CONFIRM","tags":["Exploit","Third Party Advisory"],"title":"Blink XT2 Sync Module Multiple Vulnerabilities - Research Advisory | Tenable®","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-3985","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3985","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"3985","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"amazon","cpe5":"blink_xt2_sync_module","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3985","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"amazon","cpe5":"blink_xt2_sync_module","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3985","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"amazon","cpe5":"blink_xt2_sync_module_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3985","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"amazon","cpe5":"blink_xt2_sync_module_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-3985","ASSIGNER":"vulnreport@tenable.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Amazon's Blink XT2 Sync Module","version":{"version_data":[{"version_value":"All firmware versions prior to version 2.13.11"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Command Injection"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","name":"https://www.tenable.com/security/research/tra-2019-51","url":"https://www.tenable.com/security/research/tra-2019-51"}]},"description":{"description_data":[{"lang":"eng","value":"Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when configuring the devices wifi configuration via the ssid parameter."}]}},"nvd":{"publishedDate":"2019-12-11 23:15:00","lastModifiedDate":"2019-12-13 21:05:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":8.3},"severity":"HIGH","exploitabilityScore":6.5,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:amazon:blink_xt2_sync_module_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.13.11","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:amazon:blink_xt2_sync_module:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"3985","Ordinal":"141596","Title":"CVE-2019-3985","CVE":"CVE-2019-3985","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"3985","Ordinal":"1","NoteData":"Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when configuring the devices wifi configuration via the ssid parameter.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"3985","Ordinal":"2","NoteData":"2019-12-11","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"3985","Ordinal":"3","NoteData":"2019-12-11","Type":"Other","Title":"Modified"}]}}}