D-Link DIR-806 devices allow remote attackers to execute...
Critical severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jan 6, 2025
Description
Published by the National Vulnerability Database
Sep 6, 2019
Published to the GitHub Advisory Database
May 24, 2022
Last updated
Jan 6, 2025
D-Link DIR-806 devices allow remote attackers to execute arbitrary shell commands via a trailing substring of an HTTP header that has "SOAPAction: http://purenetworks.com/HNAP1/GetDeviceSettings/" at the beginning.
References