Vulnerability Description
Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows remote attackers to execute arbitrary code by crafting malformed "Host" and "Referer" header values.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dns-322L Firmware | <= 2.00b07 |
| Dlink | Dns-322L | - |
| D-Link | Dns-320Lw Firmware | <= 1.03b04 |
| Dlink | Dns-320Lw | - |
| D-Link | Dnr-326 Firmware | <= 1.40b03 |
| Dlink | Dnr-326 | - |
| D-Link | Dns-327L Firmware | <= 1.02 |
| Dlink | Dns-327L | - |
| D-Link | Dnr-320L Firmware | <= 1.03b04 |
| Dlink | Dnr-320L | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.htmlThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/May/125Mailing ListThird Party AdvisoryVDB Entry
- http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdfTechnical DescriptionThird Party Advisory
- http://www.securityfocus.com/archive/1/535626/100/200/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/74878Third Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.htmlThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/May/125Mailing ListThird Party AdvisoryVDB Entry
- http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdfTechnical DescriptionThird Party Advisory
- http://www.securityfocus.com/archive/1/535626/100/200/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/74878Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-7859?
CVE-2014-7859 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows r...
How severe is CVE-2014-7859?
CVE-2014-7859 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2014-7859?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dns-322L Firmware, Dlink Dns-322L, D-Link Dns-320Lw Firmware, Dlink Dns-320Lw, D-Link Dnr-326 Firmware.