First published: Thu Jul 24 2014(Updated: )
Buffer overflow in ACME micro_httpd, as used in D-Link DSL2750U and DSL2740U and NetGear WGR614 and MR-ADSL-DG834 routers allows remote attackers to cause a denial of service (crash) via a long string in the URI in a GET request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acme Mini Httpd | ||
D-Link DSL-2740U | ||
D-Link DSL-2750U | ||
NetGear MR-ADSL-DG834 | ||
Netgear WGR614v9 Firmware | =v1 | |
Netgear WGR614v9 Firmware | =v2 | |
Netgear WGR614v9 Firmware | =v3 | |
Netgear WGR614v9 Firmware | =v4 | |
Netgear WGR614v9 Firmware | =v5 | |
Netgear WGR614v9 Firmware | =v6 | |
Netgear WGR614v9 Firmware | =v7 | |
Netgear WGR614v9 Firmware | =v8 | |
Netgear WGR614v9 Firmware | =v9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-4927 is considered high due to the potential for remote denial of service.
To fix CVE-2014-4927, it's recommended to update to the latest firmware version provided by the manufacturer that addresses this vulnerability.
CVE-2014-4927 affects ACME micro_httpd as used in D-Link DSL2740U, DSL2750U, and various versions of NetGear WGR614 routers.
CVE-2014-4927 enables remote attackers to perform a denial of service attack by sending a long string in the URI of a GET request.
Yes, CVE-2014-4927 is considered easy to exploit due to the straightforward nature of triggering the buffer overflow.