The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.
References
Link | Resource |
---|---|
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055 | Vendor Advisory |
http://www.zerodayinitiative.com/advisories/ZDI-15-155/ | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/37169/ | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/74330 | Third Party Advisory VDB Entry |
http://jvn.jp/en/jp/JVN47580234/index.html | Third Party Advisory |
http://jvn.jp/en/jp/JVN67456944/index.html |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2015-05-01 08:59
Updated : 2021-04-09 00:15
NVD link : CVE-2014-8361
Mitre link : CVE-2014-8361
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
d-link
- dir-809
- dir-905l
- dir-605l
- dir-619l_firmware
- dir-619l
- dir-809_firmware
- dir-600l
- dir-605l_firmware
- dir-905l_firmware
- dir-600l_firmware
realtek
- realtek_sdk