D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of HTTP_ST parameters.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-806 | product |
https://github.com/mmmmmx1/dlink/blob/main/DIR-806/1/readme.md | third party advisory exploit |