First published: Fri Aug 25 2017(Updated: )
The check_login function in D-Link DNR-326 before 2.10 build 03 allows remote attackers to bypass authentication and log in by setting the username cookie parameter to an arbitrary string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DNR-326 | <=1.40b03 | |
D-Link DNR-326 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7858 is classified as a high severity vulnerability due to its potential for remote authentication bypass.
To fix CVE-2014-7858, upgrade the D-Link DNR-326 firmware to version 2.10 build 03 or later.
CVE-2014-7858 is associated with remote attacks that exploit authentication bypass vulnerabilities.
CVE-2014-7858 affects D-Link DNR-326 firmware versions up to and including 1.40b03.
Yes, CVE-2014-7858 can be exploited by remote attackers over the internet due to the nature of the authentication bypass.