var-201505-0274
Vulnerability from variot
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. WSR-300HP provided by BUFFALO INC. contains an arbitrary code execution vulnerability. WSR-300HP provided by BUFFALO INC. is a wireless LAN router. The following multiple vulnerabilities exist in multiple products provided by ELECOM CORPORATION. ・ Inadequate access restrictions (CWE-284) - CVE-2021-20643 -Script injection on the management screen (CWE-74) - CVE-2021-20644 ・ Retractable cross-site scripting (CWE-79) - CVE-2021-20645 ・ Cross-site request forgery (CWE-352) - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 ・ OS Command injection (CWE-78) - CVE-2021-20648 -Insufficient verification of server certificate (CWE-295) - CVE-2021-20649 ・ UPnP Via OS Command injection (CWE-78) - CVE-2014-8361 CVE-2021-20643 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Institute of Information Security Yuasa Laboratory Nagakawa ( Ishibashi ) Australia Mr CVE-2021-20644 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Sato Rei Mr CVE-2021-20645, CVE-2021-20646 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Mitsui Bussan Secure Direction Co., Ltd. Tetsuyuki Ogawa Mr CVE-2021-20647, CVE-2021-20648, CVE-2021-20649 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr CVE-2021-20650 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Hiroshi Watanabe Mr CVE-2014-8361 The following person indicates that the product is vulnerable to IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr., National Institute of Information and Communications Technology Makita Daisuke Mr., National Institute of Information and Communications Technology Woods Yoshiki MrThe expected impact depends on each vulnerability, but it may be affected as follows. -The management password of the product is changed by processing the request crafted by a remote third party. - CVE-2021-20643 ・ Crafted SSID Is displayed on the management screen, and any script is executed on the user's web browser. - CVE-2021-20644 -Any script is executed on the web browser of the user who is logged in to the product. - CVE-2021-20645 -When a user logged in to the management screen of the product accesses a specially crafted page, an arbitrary request is executed, and as a result, the settings of the product are changed unintentionally. telnet Daemon is started - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 ・ Any third party who can access the product OS Command is executed - CVE-2021-20648 ・ Man-in-the-middle attack (man-in-the-middle attack) The communication response has been tampered with, resulting in arbitrary in the product. OS Command is executed - CVE-2021-20649 ・ With the product UPnP Is valid, any by a third party who has access to the product OS Command is executed - CVE-2014-8361. Authentication is not required to exploit this vulnerability.The specific flaw exists within the miniigd SOAP service. The issue lies in the handling of the NewInternalClient requests due to a failure to sanitize user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Failed exploit attempts will result in a denial-of-service condition. Realtek SDK is a set of SDK development kit developed by Realtek
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201505-0274", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-619l", "scope": "gte", "trust": 1.0, "vendor": "dlink", "version": "1.00" }, { "model": "dir-605l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "1.13" }, { "model": "dir-619l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "2.03" }, { "model": "dir-605l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "2.04" }, { "model": "dir-600l", "scope": "gte", "trust": 1.0, "vendor": "dlink", "version": "2.00" }, { "model": "dir-600l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "2.05" }, { "model": "dir-605l", "scope": "gte", "trust": 1.0, "vendor": "dlink", "version": "2.00" }, { "model": "dir-605l", "scope": "gte", "trust": 1.0, "vendor": "dlink", "version": "1.00" }, { "model": "dir-600l", "scope": "gte", "trust": 1.0, "vendor": "dlink", "version": "1.00" }, { "model": "dir-600l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "1.15" }, { "model": "dir-619l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "1.15" }, { "model": "dir-809", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "1.02" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "realtek", "version": null }, { "model": "dir-905l", "scope": "lte", "trust": 1.0, "vendor": "dlink", "version": "1.02" }, { "model": "dir-619l", "scope": "gte", "trust": 1.0, "vendor": "dlink", "version": "2.00" }, { "model": "dir-809", "scope": "gte", "trust": 1.0, "vendor": "dlink", "version": "1.00" }, { "model": "wsr-300hp", "scope": "lte", "trust": 0.8, "vendor": "buffalo", "version": "firmware 2.30" }, { "model": "ld-ps/u1", "scope": "eq", "trust": 0.8, "vendor": "elecom", "version": "(cve-2021-20643)" }, { "model": "ncc-ewf100rmwh2", "scope": "eq", "trust": 0.8, "vendor": "elecom", "version": "(cve-2021-20650)" }, { "model": "wrc-1467ghbk-a", "scope": "eq", "trust": 0.8, "vendor": "elecom", "version": "(cve-2021-20644)" }, { "model": "wrc-300febk", "scope": "eq", "trust": 0.8, "vendor": "elecom", "version": "(cve-2014-8361)" }, { "model": "wrc-300febk-a", "scope": "eq", "trust": 0.8, "vendor": "elecom", "version": "(cve-2021-20645, cve-2021-20646)" }, { "model": "wrc-300febk-s", "scope": "eq", "trust": 0.8, "vendor": "elecom", "version": "(cve-2021-20647, cve-2021-20648, cve-2021-20649, cve-2014-8361)" }, { "model": "wrc-f300nf", "scope": "eq", "trust": 0.8, "vendor": "elecom", "version": "(cve-2014-8361)" }, { "model": "dir-600l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "a1 ( firmware 1.15 )" }, { "model": "dir-600l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "b1 ( firmware 2.056b06 )" }, { "model": "dir-600l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "1.15" }, { "model": "dir-600l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "2.056b06" }, { "model": "dir-605l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "a1 ( firmware 1.14b06 )" }, { "model": "dir-605l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "bx ( firmware 2.07b02 )" }, { "model": "dir-605l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "c1 ( firmware 3.03b07 )" }, { "model": "dir-605l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "1.14b06" }, { "model": "dir-605l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "2.07b02" }, { "model": "dir-605l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "3.03b07" }, { "model": "dir-619l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "a1 ( firmware 1.15 )" }, { "model": "dir-619l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "b1 ( firmware 2.07b02 )" }, { "model": "dir-619l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "1.15" }, { "model": "dir-619l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "2.07b02" }, { "model": "dir-809", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "a1 ( firmware 1.04b02 )" }, { "model": "dir-809", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "a2 ( firmware 1.04b02 )" }, { "model": "dir-809", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "1.04b02" }, { "model": "dir-900l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "a1 ( firmware 1.14b02 )" }, { "model": "dir-900l", "scope": "lte", "trust": 0.8, "vendor": "d link", "version": "1.14b02" }, { "model": "sdk", "scope": null, "trust": 0.8, "vendor": "realtek semiconductor corp", "version": null }, { "model": "rtl81xx sdk", "scope": null, "trust": 0.7, "vendor": "realtek", "version": null }, { "model": "dir-600l", "scope": "eq", "trust": 0.6, "vendor": "d link", "version": "1.15" }, { "model": "dir-600l", "scope": "eq", "trust": 0.6, "vendor": "d link", "version": "2.05" }, { "model": "dir-905l", "scope": "eq", "trust": 0.6, "vendor": "d link", "version": "1.02" }, { "model": "dir-605l", "scope": "eq", "trust": 0.6, "vendor": "d link", "version": "1.13" }, { "model": "dir-605l", "scope": "eq", "trust": 0.6, "vendor": "d link", "version": "2.04" } ], "sources": [ { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "CNNVD", "id": "CNNVD-201504-581" }, { "db": "NVD", "id": "CVE-2014-8361" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dlink:dir-905l:a1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.13", "versionStartIncluding": "1.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.04", "versionStartIncluding": "2.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:dlink:dir-605l:b1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.15", "versionStartIncluding": "1.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.05", "versionStartIncluding": "2.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dlink:dir-600l:a1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:dlink:dir-600l:b1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:realtek:realtek_sdk:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.15", "versionStartIncluding": "1.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.03", "versionStartIncluding": "2.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dlink:dir-619l:a1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:dlink:dir-809_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.02", "versionStartIncluding": "1.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:dlink:dir-809:a1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:dlink:dir-809:a2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-8361" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ricky \"HeadlessZeke\" Lawshae", "sources": [ { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "BID", "id": "74330" }, { "db": "CNNVD", "id": "CNNVD-201504-581" } ], "trust": 1.6 }, "cve": "CVE-2014-8361", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2014-8361", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 1.6, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2017-000194", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "IPA", "availabilityImpact": "None", "baseScore": 3.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 2.6, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "Single", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 5.2, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-76306", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2017-000194", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 5.2, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 5.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "IPA", "availabilityImpact": "High", "baseScore": 6.8, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-000008", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-000008", "trust": 4.8, "value": "Medium" }, { "author": "NVD", "id": "CVE-2014-8361", "trust": 1.8, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2017-000194", "trust": 0.8, "value": "High" }, { "author": "IPA", "id": "JVNDB-2021-000008", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2014-8361", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201504-581", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-76306", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2014-8361", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "VULHUB", "id": "VHN-76306" }, { "db": "VULMON", "id": "CVE-2014-8361" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "CNNVD", "id": "CNNVD-201504-581" }, { "db": "NVD", "id": "CVE-2014-8361" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. WSR-300HP provided by BUFFALO INC. contains an arbitrary code execution vulnerability. WSR-300HP provided by BUFFALO INC. is a wireless LAN router. The following multiple vulnerabilities exist in multiple products provided by ELECOM CORPORATION. \u30fb Inadequate access restrictions (CWE-284) - CVE-2021-20643 -Script injection on the management screen (CWE-74) - CVE-2021-20644 \u30fb Retractable cross-site scripting (CWE-79) - CVE-2021-20645 \u30fb Cross-site request forgery (CWE-352) - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 \u30fb OS Command injection (CWE-78) - CVE-2021-20648 -Insufficient verification of server certificate (CWE-295) - CVE-2021-20649 \u30fb UPnP Via OS Command injection (CWE-78) - CVE-2014-8361 CVE-2021-20643 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Institute of Information Security Yuasa Laboratory Nagakawa ( Ishibashi ) Australia Mr CVE-2021-20644 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Sato Rei Mr CVE-2021-20645, CVE-2021-20646 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Mitsui Bussan Secure Direction Co., Ltd. Tetsuyuki Ogawa Mr CVE-2021-20647, CVE-2021-20648, CVE-2021-20649 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr CVE-2021-20650 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Hiroshi Watanabe Mr CVE-2014-8361 The following person indicates that the product is vulnerable to IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr., National Institute of Information and Communications Technology Makita Daisuke Mr., National Institute of Information and Communications Technology Woods Yoshiki MrThe expected impact depends on each vulnerability, but it may be affected as follows. -The management password of the product is changed by processing the request crafted by a remote third party. - CVE-2021-20643 \u30fb Crafted SSID Is displayed on the management screen, and any script is executed on the user\u0027s web browser. - CVE-2021-20644 -Any script is executed on the web browser of the user who is logged in to the product. - CVE-2021-20645 -When a user logged in to the management screen of the product accesses a specially crafted page, an arbitrary request is executed, and as a result, the settings of the product are changed unintentionally. telnet Daemon is started - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 \u30fb Any third party who can access the product OS Command is executed - CVE-2021-20648 \u30fb Man-in-the-middle attack (man-in-the-middle attack) The communication response has been tampered with, resulting in arbitrary in the product. OS Command is executed - CVE-2021-20649 \u30fb With the product UPnP Is valid, any by a third party who has access to the product OS Command is executed - CVE-2014-8361. Authentication is not required to exploit this vulnerability.The specific flaw exists within the miniigd SOAP service. The issue lies in the handling of the NewInternalClient requests due to a failure to sanitize user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Failed exploit attempts will result in a denial-of-service condition. Realtek SDK is a set of SDK development kit developed by Realtek", "sources": [ { "db": "NVD", "id": "CVE-2014-8361" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "BID", "id": "74330" }, { "db": "VULHUB", "id": "VHN-76306" }, { "db": "VULMON", "id": "CVE-2014-8361" } ], "trust": 4.14 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-76306", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=37169", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-76306" }, { "db": "VULMON", "id": "CVE-2014-8361" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-8361", "trust": 5.2 }, { "db": "ZDI", "id": "ZDI-15-155", "trust": 3.6 }, { "db": "JVN", "id": "JVN47580234", "trust": 2.6 }, { "db": "BID", "id": "74330", "trust": 2.1 }, { "db": "DLINK", "id": "SAP10055", "trust": 2.1 }, { "db": "JVN", "id": "JVN67456944", "trust": 1.8 }, { "db": "EXPLOIT-DB", "id": "37169", "trust": 1.8 }, { "db": "PACKETSTORM", "id": "132090", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2021-000008", "trust": 1.4 }, { "db": "JVN", "id": "JVN74871939", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-000194", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-008039", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-2435", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201504-581", "trust": 0.7 }, { "db": "JVNDB", "id": "JVNDB-2021-000028", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-97587", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-76306", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-8361", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "VULHUB", "id": "VHN-76306" }, { "db": "VULMON", "id": "CVE-2014-8361" }, { "db": "BID", "id": "74330" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "CNNVD", "id": "CNNVD-201504-581" }, { "db": "NVD", "id": "CVE-2014-8361" } ] }, "id": "VAR-201505-0274", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-76306" } ], "trust": 0.759098647142857 }, "last_update_date": "2024-04-18T13:16:59.233000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "BUFFALO INC. website", "trust": 0.8, "url": "http://buffalo.jp/support_s/s20170804_2.html" }, { "title": "\u7121\u7ddaLAN\u30eb\u30fc\u30bf\u30fc\u306a\u3069\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u88fd\u54c1\u306e\u4e00\u90e8\u306b\u304a\u3051\u308b\u8106\u5f31\u6027\u306b\u95a2\u3057\u3066", "trust": 0.8, "url": "https://www.elecom.co.jp/news/security/20210126-01/" }, { "title": "RTL81xx", "trust": 0.8, "url": "http://www.realtek.com/search/default.aspx?keyword=rtl81" }, { "title": "SAP10055", "trust": 0.8, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10055" }, { "title": "This vulnerability is being disclosed publicly without a patch in accordance with the ZDI vulnerability disclosure policy on lack of vendor response.Vendor Contact Timeline:08/13/2014 - ZDI wrote to vendor requesting contact and PGP09/04/2014 - ZDI wrote to vendor requesting contact and PGP09/29/2014 - ZDI wrote to vendor requesting contact and PGP10/22/2014 - ZDI wrote to vendor requesting contact and PGP, indicated \"final\" email attempt and informed of intent to 0-day04/24/2015 - Public release of advisory-- Mitigation:Given the stated purpose of Realtek SDK, and the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines. Only the clients and servers that have a legitimate procedural relationship with products using Realtek SDK service should be permitted to communicate with it. This could be accomplished in a number of ways, most notably with firewall rules/whitelisting. These features are available in the native Windows Firewall, as described in and numerous other Microsoft Knowledge Base articles.", "trust": 0.7, "url": "http://technet.microsoft.com/en-us/library/cc725770%28ws.10%29.aspx" }, { "title": "Realtek SDK miniigd SOAP Fixes for service remote code execution vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=96763" }, { "title": "", "trust": 0.1, "url": "https://github.com/xuguowong/mirai-mal " }, { "title": "api.greynoise.io", "trust": 0.1, "url": "https://github.com/greynoise-intelligence/api.greynoise.io " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/keksec-simps-botnet-gaming-ddos/166306/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/gafgyt-botnet-ddos-mirai/165424/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/valve-source-engine-fortnite-servers-crippled-by-gafgyt-variant/149719/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/new-mirai-samples-grow-the-number-of-processors-targets/143566/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/huawei-router-default-credential/140234/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/router-crapfest-malware-author-builds-18-000-strong-botnet-in-a-day/" }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/threat-landscape-for-industrial-automation-systems-in-h2-2017/85053/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/new-jenx-iot-ddos-botnet-offered-part-of-gaming-server-rental-scheme/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/jenx-botnet-has-grand-theft-auto-hook/129759/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/satori-author-linked-to-new-mirai-variant-masuta/129640/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/satori-botnet-is-now-attacking-ethereum-mining-rigs/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/code-used-in-zero-day-huawei-router-attack-made-public/129260/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/amateur-hacker-behind-satori-botnet/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/unpatched-router-vulnerability-could-lead-to-code-execution/112524/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "VULMON", "id": "CVE-2014-8361" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "CNNVD", "id": "CNNVD-201504-581" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 }, { "problemtype": "CWE-94", "trust": 0.8 }, { "problemtype": "CWE-78", "trust": 0.8 }, { "problemtype": "CWE-Other", "trust": 0.8 }, { "problemtype": "CWE-79", "trust": 0.8 }, { "problemtype": "CWE-352", "trust": 0.8 }, { "problemtype": "CWE-264", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-76306" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "NVD", "id": "CVE-2014-8361" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.zerodayinitiative.com/advisories/zdi-15-155/" }, { "trust": 2.4, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8361" }, { "trust": 2.1, "url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10055" }, { "trust": 1.9, "url": "https://www.exploit-db.com/exploits/37169/" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/74330" }, { "trust": 1.8, "url": "http://jvn.jp/en/jp/jvn47580234/index.html" }, { "trust": 1.8, "url": "http://jvn.jp/en/jp/jvn67456944/index.html" }, { "trust": 1.8, "url": "http://packetstormsecurity.com/files/132090/realtek-sdk-miniigd-upnp-soap-command-execution.html" }, { "trust": 1.1, "url": "https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/" }, { "trust": 1.1, "url": "https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=sap10055" }, { "trust": 0.8, "url": "http://jvn.jp/en/jp/jvn74871939/index.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20649" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20650" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20643" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20644" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20645" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20646" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20647" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-20648" }, { "trust": 0.8, "url": "https://jvn.jp/jp/jvn47580234/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8361" }, { "trust": 0.7, "url": "http://technet.microsoft.com/en-us/library/cc725770%28ws.10%29.aspx" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-000028.html" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-000008.html" }, { "trust": 0.3, "url": "http://www.realtek.com.tw/contact/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=41532" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/keksec-simps-botnet-gaming-ddos/166306/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "VULHUB", "id": "VHN-76306" }, { "db": "VULMON", "id": "CVE-2014-8361" }, { "db": "BID", "id": "74330" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "CNNVD", "id": "CNNVD-201504-581" }, { "db": "NVD", "id": "CVE-2014-8361" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-15-155" }, { "db": "VULHUB", "id": "VHN-76306" }, { "db": "VULMON", "id": "CVE-2014-8361" }, { "db": "BID", "id": "74330" }, { "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "db": "CNNVD", "id": "CNNVD-201504-581" }, { "db": "NVD", "id": "CVE-2014-8361" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-24T00:00:00", "db": "ZDI", "id": "ZDI-15-155" }, { "date": "2015-05-01T00:00:00", "db": "VULHUB", "id": "VHN-76306" }, { "date": "2015-05-01T00:00:00", "db": "VULMON", "id": "CVE-2014-8361" }, { "date": "2015-04-24T00:00:00", "db": "BID", "id": "74330" }, { "date": "2017-08-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "date": "2021-01-26T03:12:23", "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "date": "2015-05-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "date": "2015-04-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201504-581" }, { "date": "2015-05-01T15:59:01.287000", "db": "NVD", "id": "CVE-2014-8361" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-24T00:00:00", "db": "ZDI", "id": "ZDI-15-155" }, { "date": "2019-08-14T00:00:00", "db": "VULHUB", "id": "VHN-76306" }, { "date": "2023-09-05T00:00:00", "db": "VULMON", "id": "CVE-2014-8361" }, { "date": "2015-05-07T18:22:00", "db": "BID", "id": "74330" }, { "date": "2017-08-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-000194" }, { "date": "2021-01-26T03:12:23", "db": "JVNDB", "id": "JVNDB-2021-000008" }, { "date": "2015-05-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008039" }, { "date": "2021-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201504-581" }, { "date": "2023-09-05T22:15:07.477000", "db": "NVD", "id": "CVE-2014-8361" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201504-581" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WSR-300HP vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-000194" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201504-581" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.