D-Link DAP-1860 devices before v1.04b03 Beta allow arbitrary remote code execution as root without authentication via shell metacharacters within an HNAP_AUTH HTTP header.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10135 | third party advisory |
https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ | third party advisory exploit |