CVE-2014-7857CVE-2014-7857

Affected configuration(s):

cpe:/o:d-link:dnr-326_firmware:1.40b03
cpe:/o:d-link:dns-320b_firmware:1.02b01
cpe:/o:d-link:dns-320l_firmware:1.03b04
cpe:/o:d-link:dns-322l_firmware:2.00b07
cpe:/o:d-link:dns-325_firmware:1.05b03
cpe:/o:d-link:dns-327l_firmware:1.02
cpe:/o:d-link:dns-345_firmware:1.03b06

Date published: 2017-08-25T14:29:00.230-04:00

Date last modified: 2017-09-08T10:15:19.900-04:00

CVSS Score: 10.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html

Summary: D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session’s cookie to username=admin.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.