theinfosecnews

CVE-2019-3929

CISA KEV

Published April 15, 2022 · Updated April 3, 2026

high
Official Description+

Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.

Affected Products

VendorProduct
CrestronMultiple Products

Patch Status

Patch by 2022-05-06

Recommended Actions

  1. Check if your systems use any of the affected products listed above.
  2. Apply vendor patches immediately if available.
  3. This vulnerability is in CISA's Known Exploited Vulnerabilities catalog — prioritize remediation.
  4. Monitor vendor advisories for updates and additional mitigations.
  5. Review logs for indicators of compromise related to CVE-2019-3929.