### [CVE-2021-29379](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29379) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description ** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ### POC #### Reference - https://cool-y.github.io/2021/03/02/DIR-802-OS-Command-Injection - https://www.dlink.com/en/security-bulletin/ #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/ARPSyndicate/cvemon - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Threekiii/Awesome-POC - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/tzwlhack/Vulnerability