DLink DIR-846 Authenticated Remote Code Execution# CVE-2023-43284
DLink Model DIR-846 Authenticated Remote Code Execution.
This flaw abuse QoS POST parameter in the router to exploit an Authenticated Remote Code Execution. (Doesn't require QoS be enabled!)
```
-h, --help show this help message and exit
-x , --command Command to be executed (Default: id)
-p , --password Password from router.
-i , --ip IP from router. (Default: 192.168.0.1)
```
### Proof of Concept:

* Tested firmware version: 100A53DBR-Retail
[4.0K] /data/pocs/d54062ba248e6ab5be840e7c9620d20e42d0fc81
├── [5.8K] dlink.py
├── [ 20K] exploit.png
└── [ 586] README.md
0 directories, 3 files