CVE-2014-7859CVE-2014-7859

Affected configuration(s):

cpe:/o:d-link:dnr-320l_firmware:1.03b04
cpe:/o:d-link:dnr-326_firmware:1.40b03
cpe:/o:d-link:dns-320lw_firmware:1.03b04
cpe:/o:d-link:dns-322l_firmware:2.00b07
cpe:/o:d-link:dns-327l_firmware:1.02

Date published: 2017-08-25T14:29:00.340-04:00

Date last modified: 2017-09-08T13:11:07.907-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html

Summary: Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows remote attackers to execute arbitrary code by crafting malformed “Host” and “Referer” header values.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.