D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerability via the service parameter at hedwig.cgi.
https://drive.google.com/file/d/1y5om__f2SAhNmcPqDxC_SRTvJVAWwPcH/view
I updated the script which is now on steroids, the script accept list of ip:port (or ip only if port is not provided), use multi-threading (Tren effect :D) and output only valide credentials.
FOR EDUCATIONAL PURPOSES ONLY