First published: Wed Sep 13 2017(Updated: )
The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-850L firmware | <=fw114wwb07_h2ab | |
D-Link DIR-850L Firmware | ||
D-Link DIR-850L firmware | <=fw208wwb02 | |
dlink DIR-850L firmware | <fw114wwb07_h2ab | |
dlink DIR-850L firmware | =fw114wwb07_h2ab-beta1 | |
dlink DIR-850L firmware | <=fw208wwb02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14419 has been classified as a moderate severity vulnerability.
To fix CVE-2017-14419, update the D-Link DIR-850L firmware to a version that is not affected by this vulnerability.
The D-Link DIR-850L REV. A and REV. B devices with specific firmware versions are affected by CVE-2017-14419.
CVE-2017-14419 is a vulnerability related to the use of an insecure TCP relay service for HTTP.
Exploitation of CVE-2017-14419 could allow attackers to intercept or manipulate unencrypted HTTP traffic.