Vulnerability Description
AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and consequently execute arbitrary code, via a crafted firmware image.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Avm | Fritz\! Os | <= 6.23 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Executi
- http://seclists.org/fulldisclosure/2016/Jan/12Exploit
- http://www.securityfocus.com/archive/1/537246/100/0/threaded
- https://avm.de/service/sicherheitsinfos-zu-updates/Vendor Advisory
- https://www.redteam-pentesting.de/advisories/rt-sa-2014-014Exploit
- http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Executi
- http://seclists.org/fulldisclosure/2016/Jan/12Exploit
- http://www.securityfocus.com/archive/1/537246/100/0/threaded
- https://avm.de/service/sicherheitsinfos-zu-updates/Vendor Advisory
- https://www.redteam-pentesting.de/advisories/rt-sa-2014-014Exploit
FAQ
What is CVE-2014-8886?
CVE-2014-8886 is a vulnerability with a CVSS score of 8.1 (HIGH). AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and con...
How severe is CVE-2014-8886?
CVE-2014-8886 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8886?
Check the references section above for vendor advisories and patch information. Affected products include: Avm Fritz\! Os.