{"uuid": "4803fafa-0dc2-4f9f-98ee-de50aee79bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10891", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/175", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-frjj-4mjw-3gmf\n\ud83d\udd17 Aliases: CVE-2019-10891\n\ud83d\udd39 Details: D-Link DIR-806 devices allow remote attackers to execute arbitrary shell commands via a trailing substring of an HTTP header that has \"SOAPAction: http://purenetworks.com/HNAP1/GetDeviceSettings/\" at the beginning.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T15:30:58Z\n\ud83d\uddd3\ufe0f Published: 2022-05-24T16:55:32Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-78, CWE-94\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2019-10891\n2. https://github.com/Kirin-say/Vulnerabilities/blob/master/IR-806_Code_Injection.md\n3. https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10282", "creation_timestamp": "2025-01-06T15:38:33.000000Z"}