On D-Link DIR-823G devices, the GoAhead configuration...
Critical severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published by the National Vulnerability Database
Oct 2, 2018
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Feb 2, 2023
On D-Link DIR-823G devices, the GoAhead configuration allows /HNAP1 Command Injection via shell metacharacters in the POST data, because this data is sent directly to the "system" library function.
References