Description
8e6 R3000 Internet Filter 2.0.12.10 allows remote attackers to bypass intended restrictions via an extra HTTP Host header with additional leading text placed before the real Host header.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by nnposter · textremotemultiple
https://www.exploit-db.com/exploits/32167
References (4)
Core 4
Core References
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31391
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/495117/100/0/threaded
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30541
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44238
Scores
EPSS
0.0357
EPSS Percentile
87.8%
Details
CWE
CWE-264
Status
published
Products (1)
8e6/r3000_internet_filter
2.0.12.10
Published
Aug 06, 2008
Tracked Since
Feb 18, 2026