First published: Fri May 01 2015(Updated: )
Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek SDK | ||
D-Link DIR-905L Firmware | <=1.02 | |
D-Link DIR-905L | =a1 | |
D-Link DIR-605L Firmware | >=1.00<=1.13 | |
D-Link DIR-605L Firmware | >=2.00<=2.04 | |
D-Link DIR-605L | =a1 | |
D-Link DIR-605L | =b1 | |
D-Link DIR-600L Firmware | >=1.00<=1.15 | |
D-Link DIR-600L Firmware | >=2.00<=2.05 | |
D-Link DIR-600L | =a1 | |
D-Link DIR-600L | =b1 | |
Realtek SDK | ||
D-Link DIR-619L Firmware | >=1.00<=1.15 | |
D-Link DIR-619L Firmware | >=2.00<=2.03 | |
dlink DIR-619L firmware | =a1 | |
dlink DIR-619L firmware | =b1 | |
D-Link DIR-809 Firmware | >=1.00<=1.02 | |
dlink DIR-809 firmware | =a1 | |
dlink DIR-809 firmware | =a2 | |
All of | ||
Any of | ||
D-Link DIR-905L | =a1 | |
D-Link DIR-905L | =b1 | |
D-Link DIR-905L Firmware | <=2.05b01 | |
All of | ||
D-Link DIR-605L | =a1 | |
D-Link DIR-605L Firmware | <=1.14b06 | |
All of | ||
D-Link DIR-600L | =a1 | |
D-Link DIR-600L Firmware | <=1.15 | |
All of | ||
dlink DIR-619L firmware | =a1 | |
D-Link DIR-619L Firmware | <=1.15 | |
All of | ||
Any of | ||
dlink DIR-809 firmware | =a1 | |
dlink DIR-809 firmware | =a2 | |
D-Link DIR-809 Firmware | <=1.04b02 | |
All of | ||
D-Link DIR-605L | =b1 | |
D-Link DIR-605L Firmware | <=2.07b02 | |
All of | ||
D-Link DIR-605L | =c1 | |
D-Link DIR-605L Firmware | <=3.03b07 | |
All of | ||
dlink DIR-619L firmware | =b1 | |
D-Link DIR-619L Firmware | <=2.07b02 | |
All of | ||
D-Link DIR-600L | =b1 | |
D-Link DIR-600L Firmware | <=2.056b06 | |
All of | ||
D-Link DIR-501 Firmware | <=1.01b04 | |
D-Link DIR-501 Firmware | =a1 | |
All of | ||
D-Link DIR-515 Firmware | <=1.01b04 | |
D-Link DIR-515 | =a1 | |
All of | ||
D-Link DIR-615 | =10.01b02 | |
D-Link DIR-615 | =j1 | |
All of | ||
Any of | ||
D-Link DIR-615 | <=6.06b03 | |
D-Link DIR-615 | =10.01b02 | |
D-Link DIR-615 | =fx | |
All of | ||
NEC Aterm WG1900HP2 Firmware | <=1.3.1 | |
Aterm WG1900HP2 | ||
All of | ||
NEC Aterm WG1900HP Firmware | <=2.5.1 | |
NEC Aterm WG1900HP Firmware | ||
All of | ||
NEC Aterm WG1800HP4 firmware | <=1.3.1 | |
Nec Aterm WG1800HP4 | ||
All of | ||
NEC Aterm WG1800HP3 firmware | <=1.5.1 | |
NEC Aterm WG1800HP3 | ||
All of | ||
NEC Aterm WG1200HS2 firmware | <=2.5.0 | |
Aterm WG1200HS2 | ||
All of | ||
NEC Aterm WG1200HP3 Firmware | <=1.3.1 | |
NEC Aterm WG1200HP3 | ||
All of | ||
NEC Aterm WG1200HP2 firmware | <=2.5.0 | |
Aterm WG1200HP2 firmware | ||
All of | ||
NEC Aterm W1200EX Firmware | <=1.3.1 | |
NEC Aterm W1200EX Firmware | ||
All of | ||
Aterm W1200EX | <=1.3.1 | |
Aterm W1200EX-MS Firmware | ||
All of | ||
NEC Aterm WG1200HS | ||
NEC Aterm WG1200HS3 | ||
All of | ||
NEC Aterm WG1200HP firmware | ||
Aterm WG1200HP2 firmware | ||
All of | ||
NEC Aterm WF800HP firmware | ||
Aterm WF800HP Firmware | ||
All of | ||
NeC Aterm WF300HP2 Firmware | ||
NEC Aterm WF300HP2 Firmware | ||
All of | ||
NEC Aterm WR8165N firmware | ||
Aterm | ||
All of | ||
NEC Aterm W500P Firmware | ||
NEC Aterm W500P | ||
All of | ||
Nec Aterm W300p Firmware | ||
Nec Aterm W300p Firmware |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8361 is a critical vulnerability that allows remote code execution due to improper input validation in the Realtek SDK.
To fix CVE-2014-8361, update the firmware of affected devices to the latest version provided by the vendor.
Devices using the Realtek SDK, including various D-Link routers, are affected by CVE-2014-8361.
CVE-2014-8361 can be exploited by remote attackers to execute arbitrary code through a crafted SOAP request.
A temporary workaround for CVE-2014-8361 may include disabling the miniigd SOAP service until a patch is applied.