Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-8361 (GCVE-0-2014-8361)
Vulnerability from cvelistv5 – Published: 2015-05-01 00:00 – Updated: 2025-10-21 23:56
VLAI?
EPSS
Summary
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Severity ?
9.8 (Critical)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:18:47.756Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/"
},
{
"tags": [
"x_transferred"
],
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"
},
{
"name": "74330",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/74330"
},
{
"name": "37169",
"tags": [
"exploit",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/37169/"
},
{
"name": "JVN#47580234",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN47580234/index.html"
},
{
"name": "JVN#67456944",
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN67456944/index.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"
},
{
"tags": [
"x_transferred"
],
"url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2014-8361",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-07T21:57:55.692724Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-09-18",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:56:01.609Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-09-18T00:00:00.000Z",
"value": "CVE-2014-8361 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-04-30T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-05T21:35:13.232Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/"
},
{
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"
},
{
"name": "74330",
"tags": [
"vdb-entry"
],
"url": "http://www.securityfocus.com/bid/74330"
},
{
"name": "37169",
"tags": [
"exploit"
],
"url": "https://www.exploit-db.com/exploits/37169/"
},
{
"name": "JVN#47580234",
"tags": [
"third-party-advisory"
],
"url": "http://jvn.jp/en/jp/JVN47580234/index.html"
},
{
"name": "JVN#67456944",
"tags": [
"third-party-advisory"
],
"url": "http://jvn.jp/en/jp/JVN67456944/index.html"
},
{
"url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"
},
{
"url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-8361",
"datePublished": "2015-05-01T00:00:00.000Z",
"dateReserved": "2014-10-20T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:56:01.609Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2014-8361",
"cwes": "[\"CWE-20\"]",
"dateAdded": "2023-09-18",
"dueDate": "2023-10-09",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361",
"product": "SDK",
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.",
"vendorProject": "Realtek",
"vulnerabilityName": "Realtek SDK Improper Input Validation Vulnerability"
},
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.zerodayinitiative.com/advisories/ZDI-15-155/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/74330\", \"name\": \"74330\", \"tags\": [\"vdb-entry\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/37169/\", \"name\": \"37169\", \"tags\": [\"exploit\", \"x_transferred\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN47580234/index.html\", \"name\": \"JVN#47580234\", \"tags\": [\"third-party-advisory\", \"x_transferred\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN67456944/index.html\", \"name\": \"JVN#67456944\", \"tags\": [\"third-party-advisory\", \"x_transferred\"]}, {\"url\": \"https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T13:18:47.756Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2014-8361\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-07T21:57:55.692724Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-09-18\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-09-18T00:00:00.000Z\", \"value\": \"CVE-2014-8361 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-03T15:41:24.395Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2015-04-30T00:00:00.000Z\", \"references\": [{\"url\": \"http://www.zerodayinitiative.com/advisories/ZDI-15-155/\"}, {\"url\": \"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055\"}, {\"url\": \"http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html\"}, {\"url\": \"http://www.securityfocus.com/bid/74330\", \"name\": \"74330\", \"tags\": [\"vdb-entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/37169/\", \"name\": \"37169\", \"tags\": [\"exploit\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN47580234/index.html\", \"name\": \"JVN#47580234\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN67456944/index.html\", \"name\": \"JVN#67456944\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/\"}, {\"url\": \"https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-09-05T21:35:13.232Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2014-8361\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:56:01.609Z\", \"dateReserved\": \"2014-10-20T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2015-05-01T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GSD-2014-8361
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2014-8361",
"description": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.",
"id": "GSD-2014-8361",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2014-8361"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-8361"
],
"details": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.",
"id": "GSD-2014-8361",
"modified": "2023-12-13T01:22:49.484750Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-8361",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/"
},
{
"name": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055",
"refsource": "CONFIRM",
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"name": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"
},
{
"name": "74330",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74330"
},
{
"name": "37169",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37169/"
},
{
"name": "JVN#47580234",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN47580234/index.html"
},
{
"name": "JVN#67456944",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN67456944/index.html"
},
{
"name": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/",
"refsource": "MISC",
"url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"
},
{
"name": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055",
"refsource": "MISC",
"url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.02",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-905l:a1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.13",
"versionStartIncluding": "1.00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.04",
"versionStartIncluding": "2.00",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-605l:b1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.15",
"versionStartIncluding": "1.00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.05",
"versionStartIncluding": "2.00",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-600l:a1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-600l:b1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:realtek:realtek_sdk:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.15",
"versionStartIncluding": "1.00",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.03",
"versionStartIncluding": "2.00",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-619l:a1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:dlink:dir-809_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.02",
"versionStartIncluding": "1.00",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-809:a1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:dlink:dir-809:a2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-8361"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/"
},
{
"name": "37169",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37169/"
},
{
"name": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"
},
{
"name": "74330",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/74330"
},
{
"name": "JVN#47580234",
"refsource": "JVN",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN47580234/index.html"
},
{
"name": "JVN#67456944",
"refsource": "JVN",
"tags": [],
"url": "http://jvn.jp/en/jp/JVN67456944/index.html"
},
{
"name": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/",
"refsource": "MISC",
"tags": [],
"url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"
},
{
"name": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055",
"refsource": "MISC",
"tags": [],
"url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-09-05T22:15Z",
"publishedDate": "2015-05-01T15:59Z"
}
}
}
CNVD-2015-02823
Vulnerability from cnvd - Published: 2015-04-30
VLAI Severity ?
Title
Realtek rtl81xx miniigd SOAP服务远程代码执行漏洞
Description
Realtek rtl81xx SDK是瑞昱(Realtek)公司的一套rtl81xx系列网卡驱动及SDK开发包。
Realtek rtl81xx SDK的miniigd SOAP服务存在远程代码执行漏洞。由于程序执行系统调用前未能过滤用户数据。攻击者可利用该漏洞以‘root’权限执行任意代码。
Severity
高
Formal description
目前没有详细解决方案提供: http://www.realtek.com.tw/
Reference
http://www.zerodayinitiative.com/advisories/ZDI-15-155
Impacted products
| Name | Realtek rtl81xx SDK |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2014-8361"
}
},
"description": "Realtek rtl81xx SDK\u662f\u745e\u6631\uff08Realtek\uff09\u516c\u53f8\u7684\u4e00\u5957rtl81xx\u7cfb\u5217\u7f51\u5361\u9a71\u52a8\u53caSDK\u5f00\u53d1\u5305\u3002\r\n\r\nRealtek rtl81xx SDK\u7684miniigd SOAP\u670d\u52a1\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u7531\u4e8e\u7a0b\u5e8f\u6267\u884c\u7cfb\u7edf\u8c03\u7528\u524d\u672a\u80fd\u8fc7\u6ee4\u7528\u6237\u6570\u636e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5\u2018root\u2019\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Ricky \"HeadlessZeke\" Lawshae",
"formalWay": "\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\uff1a\r\nhttp://www.realtek.com.tw/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-02823",
"openTime": "2015-04-30",
"products": {
"product": "Realtek rtl81xx SDK"
},
"referenceLink": "http://www.zerodayinitiative.com/advisories/ZDI-15-155",
"serverity": "\u9ad8",
"submitTime": "2015-04-30",
"title": "Realtek rtl81xx miniigd SOAP\u670d\u52a1\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
GHSA-R272-2VH9-Q99X
Vulnerability from github – Published: 2022-05-13 01:11 – Updated: 2025-10-22 00:31
VLAI?
Details
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.
Severity ?
9.8 (Critical)
{
"affected": [],
"aliases": [
"CVE-2014-8361"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-05-01T15:59:00Z",
"severity": "HIGH"
},
"details": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.",
"id": "GHSA-r272-2vh9-q99x",
"modified": "2025-10-22T00:31:09Z",
"published": "2022-05-13T01:11:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8361"
},
{
"type": "WEB",
"url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/37169"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN47580234/index.html"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN67456944/index.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"
},
{
"type": "WEB",
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/74330"
},
{
"type": "WEB",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
JVNDB-2021-000028
Vulnerability from jvndb - Published: 2021-04-09 17:16 - Updated:2021-04-09 17:16
Severity ?
Summary
Multiple vulnerabilities in multiple Aterm products
Details
Multiple Aterm products provided by NEC Corporation contain multiple vulnerabilities listed below.
*Cross-site Scripting (CWE-79) - CVE-2021-20680
*OS command injection via UPnP (CWE-78) - CVE-2014-8361
CVE-2021-20680
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2014-8361
Satoru Nagaoka of Cyber Defense Institute, Inc, Katsuhiko Sato (a.k.a. goroh_kun) and Ryo Kashiro of 00One, Inc. and Rintaro Fujita of Nippon Telegraph and Telephone Corporation reported to IPA that CVE-2014-8361 vulnerability still exists in NEC Corporation products. JPCERT/CC coordinated with the developer.
References
| Type | URL | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Impacted products
| Vendor | Product | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000028.html",
"dc:date": "2021-04-09T17:16+09:00",
"dcterms:issued": "2021-04-09T17:16+09:00",
"dcterms:modified": "2021-04-09T17:16+09:00",
"description": "Multiple Aterm products provided by NEC Corporation contain multiple vulnerabilities listed below.\r\n\r\n*Cross-site Scripting (CWE-79) - CVE-2021-20680\r\n*OS command injection via UPnP (CWE-78) - CVE-2014-8361\r\n\r\nCVE-2021-20680\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2014-8361\r\nSatoru Nagaoka of Cyber Defense Institute, Inc, Katsuhiko Sato (a.k.a. goroh_kun) and Ryo Kashiro of 00One, Inc. and Rintaro Fujita of Nippon Telegraph and Telephone Corporation reported to IPA that CVE-2014-8361 vulnerability still exists in NEC Corporation products. JPCERT/CC coordinated with the developer.",
"link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000028.html",
"sec:cpe": [
{
"#text": "cpe:/o:nec:aterm_w1200ex-ms_firmware",
"@product": "Aterm W1200EX-MS firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_w1200ex_firmware",
"@product": "Aterm W1200EX firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_w300p_firmware",
"@product": "Aterm W300P firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_w500p_firmware",
"@product": "Aterm W500P firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wf300hp2_firmware",
"@product": "Aterm WF300HP2 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wf800hp_firmware",
"@product": "Aterm WF800HP firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1200hp2_firmware",
"@product": "Aterm WG1200HP2 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1200hp3_firmware",
"@product": "Aterm WG1200HP3 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1200hp_firmware",
"@product": "Aterm WG1200HP firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1200hs2_firmware",
"@product": "Aterm WG1200HS2 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1200hs3_firmware",
"@product": "Aterm WG1200HS3 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1200hs_firmware",
"@product": "Aterm WG1200HS firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1800hp3_firmware",
"@product": "Aterm WG1800HP3 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1800hp4_firmware",
"@product": "Aterm WG1800HP4 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1900hp2_firmware",
"@product": "Aterm WG1900HP2 firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wg1900hp_firmware",
"@product": "Aterm WG1900HP firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
},
{
"#text": "cpe:/o:nec:aterm_wr8165n_firmware",
"@product": "Aterm WR8165N firmware",
"@vendor": "NEC Corporation",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "5.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
{
"@score": "8.8",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2021-000028",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN67456944/index.html",
"@id": "JVN#67456944",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8361",
"@id": "CVE-2014-8361",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20680",
"@id": "CVE-2021-20680",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2014-8361",
"@id": "CVE-2014-8361",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20680",
"@id": "CVE-2021-20680",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "Multiple vulnerabilities in multiple Aterm products"
}
JVNDB-2021-000008
Vulnerability from jvndb - Published: 2021-01-26 16:33 - Updated:2021-01-26 16:33
Severity ?
Summary
Multiple vulnerabilities in multiple ELECOM products
Details
Multiple products provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.
*Improper Access Control (CWE-284) - CVE-2021-20643
*Script injection in web setup page (CWE-74) - CVE-2021-20644
*Stored cross-site scripting (CWE-79) - CVE-2021-20645
*Cross-site request forgery (CWE-352) - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650
*OS command injection (CWE-78) - CVE-2021-20648
*Improper server certificate verification (CWE-295) - CVE-2021-20649
*OS command injection via UPnP (CWE-78) - CVE-2014-8361
CVE-2021-20643
NAGAKAWA(ISHIBASHI), Tsuyoshi of INSTITUTE of INFORMATION SECURITY Yuasa Lab. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2021-20644
Ryo Sato reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2021-20645, CVE-2021-20646
Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2021-20647, CVE-2021-20648, CVE-2021-20649
Satoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVE-2021-20650
Yutaka WATANABE reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Satoru Nagaoka of Cyber Defense Institute, Inc. and Daisuke Makita and Yoshiki Mori of National Institude of Information and Communications Technology reported that CVE-2014-8361 vulnerability still exists in ELECOM product to IPA. JPCERT/CC coordinated with the developer.
References
| Type | URL | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000008.html",
"dc:date": "2021-01-26T16:33+09:00",
"dcterms:issued": "2021-01-26T16:33+09:00",
"dcterms:modified": "2021-01-26T16:33+09:00",
"description": "Multiple products provided by ELECOM CO.,LTD. contain multiple vulnerabilities listed below.\r\n*Improper Access Control (CWE-284) - CVE-2021-20643\r\n*Script injection in web setup page (CWE-74) - CVE-2021-20644\r\n*Stored cross-site scripting (CWE-79) - CVE-2021-20645\r\n*Cross-site request forgery (CWE-352) - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650\r\n*OS command injection (CWE-78) - CVE-2021-20648\r\n*Improper server certificate verification (CWE-295) - CVE-2021-20649\r\n*OS command injection via UPnP (CWE-78) - CVE-2014-8361\r\n\r\nCVE-2021-20643\r\nNAGAKAWA(ISHIBASHI), Tsuyoshi of INSTITUTE of INFORMATION SECURITY Yuasa Lab. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2021-20644\r\nRyo Sato reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2021-20645, CVE-2021-20646\r\nSatoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2021-20647, CVE-2021-20648, CVE-2021-20649\r\nSatoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nCVE-2021-20650\r\nYutaka WATANABE reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.\r\n\r\nSatoru Nagaoka of Cyber Defense Institute, Inc. and Daisuke Makita and Yoshiki Mori of National Institude of Information and Communications Technology reported that CVE-2014-8361 vulnerability still exists in ELECOM product to IPA. JPCERT/CC coordinated with the developer.",
"link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000008.html",
"sec:cpe": [
{
"#text": "cpe:/o:elecom:ld-ps%2fu1_firmware",
"@product": "LD-PS/U1",
"@vendor": "ELECOM CO.,LTD.",
"@version": "2.2"
},
{
"#text": "cpe:/o:elecom:ncc-ewf100rmwh2_firmware",
"@product": "NCC-EWF100RMWH2",
"@vendor": "ELECOM CO.,LTD.",
"@version": "2.2"
},
{
"#text": "cpe:/o:elecom:wrc-1467ghbk-a_firmware",
"@product": "WRC-1467GHBK-A",
"@vendor": "ELECOM CO.,LTD.",
"@version": "2.2"
},
{
"#text": "cpe:/o:elecom:wrc-300febk-a_firmware",
"@product": "WRC-300FEBK-A",
"@vendor": "ELECOM CO.,LTD.",
"@version": "2.2"
},
{
"#text": "cpe:/o:elecom:wrc-300febk-s_firmware",
"@product": "WRC-300FEBK-S",
"@vendor": "ELECOM CO.,LTD.",
"@version": "2.2"
},
{
"#text": "cpe:/o:elecom:wrc-300febk_firmware",
"@product": "WRC-300FEBK firmware",
"@vendor": "ELECOM CO.,LTD.",
"@version": "2.2"
},
{
"#text": "cpe:/o:elecom:wrc-f300nf_firmware",
"@product": "WRC-F300NF firmware",
"@vendor": "ELECOM CO.,LTD.",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "5.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
{
"@score": "8.8",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2021-000008",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN47580234/index.html",
"@id": "JVN#47580234",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20643",
"@id": "CVE-2021-20643",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20644",
"@id": "CVE-2021-20644",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20645",
"@id": "CVE-2021-20645",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20646",
"@id": "CVE-2021-20646",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20647",
"@id": "CVE-2021-20647",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20648",
"@id": "CVE-2021-20648",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20649",
"@id": "CVE-2021-20649",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20650",
"@id": "CVE-2021-20650",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8361",
"@id": "CVE-2014-8361",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2014-8361",
"@id": "CVE-2014-8361",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20643",
"@id": "CVE-2021-20643",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20644",
"@id": "CVE-2021-20644",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20645",
"@id": "CVE-2021-20645",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20646",
"@id": "CVE-2021-20646",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20647",
"@id": "CVE-2021-20647",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20648",
"@id": "CVE-2021-20648",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20649",
"@id": "CVE-2021-20649",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20650",
"@id": "CVE-2021-20650",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-264",
"@title": "Permissions(CWE-264)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-352",
"@title": "Cross-Site Request Forgery(CWE-352)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "Multiple vulnerabilities in multiple ELECOM products"
}
JVNDB-2017-000194
Vulnerability from jvndb - Published: 2017-08-08 18:07 - Updated:2024-07-02 17:55
Severity ?
Summary
WSR-300HP vulnerable to arbitrary code execution
Details
WSR-300HP provided by BUFFALO INC. contains an arbitrary code execution vulnerability.
WSR-300HP provided by BUFFALO INC. is a wireless LAN router. WSR-300HP contains an arbitrary code execution vulnerability.
References
| Type | URL | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000194.html",
"dc:date": "2024-07-02T17:55+09:00",
"dcterms:issued": "2017-08-08T18:07+09:00",
"dcterms:modified": "2024-07-02T17:55+09:00",
"description": "WSR-300HP provided by BUFFALO INC. contains an arbitrary code execution vulnerability.\r\n\r\nWSR-300HP provided by BUFFALO INC. is a wireless LAN router. WSR-300HP contains an arbitrary code execution vulnerability.",
"link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000194.html",
"sec:cpe": {
"#text": "cpe:/h:buffalo_inc:wsr-300hp",
"@product": "WSR-300HP",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "5.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
{
"@score": "8.8",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2017-000194",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN74871939/index.html",
"@id": "JVN#74871939",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8361",
"@id": "CVE-2014-8361",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2014-8361",
"@id": "CVE-2014-8361",
"@source": "NVD"
},
{
"#text": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"@id": "CVE-2014-8361",
"@source": "CISA Known Exploited Vulnerabilities Catalog"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-94",
"@title": "Code Injection(CWE-94)"
}
],
"title": "WSR-300HP vulnerable to arbitrary code execution"
}
FKIE_CVE-2014-8361
Vulnerability from fkie_nvd - Published: 2015-05-01 15:59 - Updated: 2025-10-22 00:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://jvn.jp/en/jp/JVN47580234/index.html | Third Party Advisory | |
| cve@mitre.org | http://jvn.jp/en/jp/JVN67456944/index.html | Third Party Advisory | |
| cve@mitre.org | http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055 | Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/74330 | Broken Link, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-15-155/ | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/ | Third Party Advisory | |
| cve@mitre.org | https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055 | Third Party Advisory | |
| cve@mitre.org | https://www.exploit-db.com/exploits/37169/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN47580234/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN67456944/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/74330 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-15-155/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/37169/ | Third Party Advisory, VDB Entry | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dlink | dir-905l_firmware | * | |
| dlink | dir-905l | a1 | |
| dlink | dir-905l | b1 | |
| dlink | dir-605l_firmware | * | |
| dlink | dir-605l | a1 | |
| dlink | dir-600l_firmware | * | |
| dlink | dir-600l | a1 | |
| dlink | dir-619l_firmware | * | |
| dlink | dir-619l | a1 | |
| dlink | dir-619l_firmware | * | |
| dlink | dir-619l | b1 | |
| dlink | dir-605l_firmware | * | |
| dlink | dir-605l | b1 | |
| dlink | dir-605l_firmware | * | |
| dlink | dir-605l | c1 | |
| dlink | dir-600l_firmware | * | |
| dlink | dir-600l | b1 | |
| dlink | dir-809_firmware | * | |
| dlink | dir-809 | a1 | |
| dlink | dir-809 | a2 | |
| dlink | dir-900l_firmware | * | |
| dlink | dir-900l | a1 | |
| realtek | realtek_sdk | - | |
| dlink | dir-501_firmware | * | |
| dlink | dir-501 | a1 | |
| dlink | dir-515_firmware | * | |
| dlink | dir-515 | a1 | |
| dlink | dir-615_firmware | 10.01b02 | |
| dlink | dir-615 | j1 | |
| dlink | dir-615_firmware | * | |
| dlink | dir-615 | fx | |
| aterm | wg1900hp2_firmware | * | |
| aterm | wg1900hp2 | - | |
| aterm | wg1900hp_firmware | * | |
| aterm | wg1900hp | - | |
| aterm | wg1800hp4_firmware | * | |
| aterm | wg1800hp4 | - | |
| aterm | wg1800hp3_firmware | * | |
| aterm | wg1800hp3 | - | |
| aterm | wg1200hs2_firmware | * | |
| aterm | wg1200hs2 | - | |
| aterm | wg1200hp3_firmware | * | |
| aterm | wg1200hp3 | - | |
| aterm | wg1200hp2_firmware | * | |
| aterm | wg1200hp2 | - | |
| aterm | w1200ex_firmware | * | |
| aterm | w1200ex | - | |
| aterm | w1200ex-ms_firmware | * | |
| aterm | w1200ex-ms | - | |
| aterm | wg1200hs_firmware | * | |
| aterm | wg1200hs | - | |
| aterm | wg1200hp_firmware | * | |
| aterm | wg1200hp | - | |
| aterm | wf800hp_firmware | * | |
| aterm | wf800hp | - | |
| aterm | wf300hp2_firmware | * | |
| aterm | wf300hp2 | - | |
| aterm | wr8165n_firmware | * | |
| aterm | wr8165n | - | |
| aterm | w500p_firmware | * | |
| aterm | w500p | - | |
| aterm | w300p_firmware | * | |
| aterm | w300p | - |
{
"cisaActionDue": "2023-10-09",
"cisaExploitAdd": "2023-09-18",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Realtek SDK Improper Input Validation Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05CB91FD-6322-48FB-8CCE-3E7DDB622063",
"versionEndIncluding": "2.05b01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-905l:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "F50CC55A-1EA1-4096-8489-1CE1E991B305",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dlink:dir-905l:b1:*:*:*:*:*:*:*",
"matchCriteriaId": "21EDEA1E-6F3C-4E92-A732-270D1E086576",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01D15D52-C442-4ABE-917C-A50908082089",
"versionEndIncluding": "1.14b06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA9038E9-8519-4DC7-8843-74ADB3527A3F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90962768-A07F-4A1E-9500-F743FD1ECA96",
"versionEndIncluding": "1.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-600l:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "F75E7D9C-03BE-4301-AF9E-9929C33F4EEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22544CBE-CE28-4E13-99CD-9855A76F8EDF",
"versionEndIncluding": "1.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-619l:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "3271958C-23CD-4937-A21A-905A18ECA736",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FCD4837-81DE-4C00-AC6C-0E7D6036E1D6",
"versionEndIncluding": "2.07b02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89CE2A47-DC82-49A7-874E-C9533E153ECF",
"versionEndIncluding": "2.07b02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-605l:b1:*:*:*:*:*:*:*",
"matchCriteriaId": "1B1FC91F-1B77-406F-ADB5-98B07866601E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B8247C1-8A71-4004-8ECE-1984335D697D",
"versionEndIncluding": "3.03b07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-605l:c1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD38B14-B291-423A-912C-B1BB2070A9C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C66EAA7D-A420-4CBF-AD01-754983012129",
"versionEndIncluding": "2.056b06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-600l:b1:*:*:*:*:*:*:*",
"matchCriteriaId": "6966FB89-8C98-4FA3-B4CA-21CAD495A830",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-809_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CCC25F5-5E8A-4164-84D8-DDC0D3519E2B",
"versionEndIncluding": "1.04b02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-809:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "184F3169-C4BE-4ABF-AFED-B8D39522092F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dlink:dir-809:a2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE2F27F-A180-4459-8D73-5544568BB53D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-900l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3757810-6826-4389-8621-A87267D71B64",
"versionEndExcluding": "1.15b01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-900l:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "2396542D-7E98-41B4-9BF1-31CE699B0FF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:realtek:realtek_sdk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62471288-17B2-4FCA-A673-CC4B24FB6262",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-501_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1339C5-FD81-4885-AF24-A05BC1A3B02A",
"versionEndIncluding": "1.01b04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-501:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8C6464-A044-4C0B-8ADB-C2F61C3009E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-515_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA66695-A646-4AB9-B128-A3D87C4C8284",
"versionEndIncluding": "1.01b04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-515:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "037A3A92-EC1C-41AC-A93A-7319E8E98240",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-615_firmware:10.01b02:*:*:*:*:*:*:*",
"matchCriteriaId": "17FD57FF-A596-4151-860C-3F0486CD85F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-615:j1:*:*:*:*:*:*:*",
"matchCriteriaId": "30B14CF6-4239-4BAB-ABA0-284AFDA2C9E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F41E73AD-5615-4084-AC4E-516A934303CA",
"versionEndIncluding": "6.06b03",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dlink:dir-615:fx:*:*:*:*:*:*:*",
"matchCriteriaId": "63134C26-FEA9-4EF5-97D9-FEDA14B34516",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1900hp2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A05F11D3-7701-4152-9937-04D7134B4FE6",
"versionEndIncluding": "1.3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1900hp2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E007A9B5-74FE-4230-9E3E-ACEA89FCABA8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1900hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DD2168-9BE3-49E8-952D-4775911C04D6",
"versionEndIncluding": "2.5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1900hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70FC2B64-D47F-42DF-B9B4-7FB07F98A150",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1800hp4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE7372C-DB92-419F-877C-CCE0DC3EBD6C",
"versionEndIncluding": "1.3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1800hp4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BB5205-0D2E-43AF-B228-9C728B404EA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1800hp3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBDC178B-2033-47EA-B6CC-99880D5772A2",
"versionEndIncluding": "1.5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1800hp3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD47CE10-EBD2-49A9-9F1A-B77A502AC196",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1200hs2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "424AB1C2-6C52-4416-8983-53D4BCAA0F80",
"versionEndIncluding": "2.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1200hs2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC88BDE5-19B4-4EF4-8C14-2DEB8EAD3D91",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1200hp3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED15E56-530C-42A3-B3D3-9F1090C524D5",
"versionEndIncluding": "1.3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1200hp3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F13C13D3-FB31-4E20-A5D4-992D4CF6BBCC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1200hp2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7FDD550-9FDE-4001-933E-51FF4FBDC5AA",
"versionEndIncluding": "2.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1200hp2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "347DFD5E-56E0-473F-A2B1-E3FD2E99573A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:w1200ex_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88A2A125-9991-459A-99D2-5158B72372BD",
"versionEndIncluding": "1.3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:w1200ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D0D008-E851-4756-87E4-5FA60EE65040",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:w1200ex-ms_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C69CCDC3-BB41-45F2-987D-674FAD937F40",
"versionEndIncluding": "1.3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:w1200ex-ms:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD0A960-9FA2-4838-A867-7AC688749771",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1200hs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5C80AB-4775-4D46-9FC7-C341CEAB08A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1200hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05C494FC-4284-4325-A05C-DDAAF86857F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wg1200hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC81201F-93A7-4B54-A7FE-51E4FD12AE54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wg1200hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E80DDB01-BA42-40E1-91A3-EBFCEC3F8A49",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wf800hp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D83ABC6-AB7F-494C-B386-EB4212F50C55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wf800hp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "141077D2-4439-44AA-9BD1-C60E253B4C6F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wf300hp2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EF09945-D1B9-45FF-87DF-1573DB5F51BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wf300hp2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "514DD5D5-E44F-432E-AE87-25DDA62636AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:wr8165n_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08699FDC-5E04-4CF3-9C9A-9231795A6420",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:wr8165n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90FC20CF-70E5-4E50-A383-E24CB0987280",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:w500p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54E372D5-C699-4ED4-9AB3-326ADC9834BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:w500p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9CC1968-0B25-4324-AB07-688B32770220",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aterm:w300p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B02F690-7098-4C8C-B453-3EC8C01F0343",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:aterm:w300p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A810B81E-8EE7-4F63-9380-7C68CB33B404",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023."
},
{
"lang": "es",
"value": "El servicio SOAP miniigd en Realtek SDK permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud NewInternalClient manipulada espec\u00edficamente, como se explot\u00f3 de forma activa hasta 2023."
}
],
"id": "CVE-2014-8361",
"lastModified": "2025-10-22T00:15:39.940",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2015-05-01T15:59:01.287",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN47580234/index.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN67456944/index.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/74330"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37169/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN47580234/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://jvn.jp/en/jp/JVN67456944/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/74330"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-155/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37169/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…