First published: Fri Aug 25 2017(Updated: )
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DNR-322L Firmware | <=2.00b07 | |
D-Link DNS-322L | ||
Dlink DNS-325 | <=1.05b03 | |
D-Link DNS-325 | ||
D-Link DNS-345 Firmware | <=1.03b06 | |
D-Link DNS-345 | ||
D-Link DNS-320B Firmware | <=1.02b01 | |
D-Link DNS-320B | ||
D-Link DNR-326 | <=1.40b03 | |
D-Link DNR-326 | ||
Dlink Dns-327l Firmware | <=1.02 | |
D-Link DNS-327L | ||
D-Link DNS-320L firmware | <=1.03b04 | |
D-Link DNS-320L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7857 has been assigned a high severity rating due to the potential for remote exploitation.
CVE-2014-7857 affects D-Link DNS-320L, DNS-327L, DNR-326, DNS-320B, DNS-345, DNS-325, and DNS-322L firmware versions below the specified updates.
To fix CVE-2014-7857, update the firmware of the affected D-Link devices to the latest version listed in the advisory.
Yes, CVE-2014-7857 allows remote attackers to bypass authentication, making it possible for unauthorized access.
The impact of CVE-2014-7857 includes unauthorized administrative access, potentially leading to data compromise and device misuse.