News, Vulnerability
If you have a strong dislike for advertisements intruding on your internet experience and you like to tinker and DIY your home network, then you might likely have deployed a Pi-hole in your environment. This vulnerability does require access to the Pi-hole webui and admin credentials, but it allows for arbitrary command execution. Pi-hole versions … Read More “REMOTE CODE EXECUTION in Pi-hole CVE-2020-8816” »