Vulnerability Details : CVE-2014-7857
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
Vulnerability category: BypassGain privilege
Products affected by CVE-2014-7857
- cpe:2.3:o:d-link:dns-322l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dns-325_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dns-345_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dns-320b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dnr-326_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dns-327l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dns-320l_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-7857
1.96%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-7857
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2014-7857
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7857
-
http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdf
Technical Description
-
http://www.securityfocus.com/archive/1/535626/100/200/threaded
SecurityFocus
-
http://www.securityfocus.com/bid/74880
Multiple D-Link Products CVE-2014-7857 Multiple Authentication Bypass VulnerabilitiesThird Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2015/May/125
Mailing List;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.html
D-Link Bypass / Buffer Overflow ≈ Packet StormThird Party Advisory;VDB Entry
Jump to