Vulnerability Details : CVE-2014-8361
Public exploit exists!
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Vulnerability category: Execute code
Products affected by CVE-2014-8361
- cpe:2.3:o:aterm:wf800hp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1900hp2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1900hp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1800hp4_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1800hp3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1200hs2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1200hp3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1200hp2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:w1200ex_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:w1200ex-ms_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1200hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wg1200hp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wf300hp2_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:wr8165n_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:w500p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:aterm:w300p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:realtek:realtek_sdk:-:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-615_firmware:10.01b02:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-809_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-501_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:dlink:dir-515_firmware:*:*:*:*:*:*:*:*
CVE-2014-8361 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Realtek SDK Improper Input Validation Vulnerability
CISA required action:
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
CISA description:
Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.
Notes:
https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361
Added on
2023-09-18
Action due date
2023-10-09
Exploit prediction scoring system (EPSS) score for CVE-2014-8361
96.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-8361
-
D-Link Devices UPnP SOAP Command Execution
Disclosure Date: 2013-07-05First seen: 2020-04-26exploit/linux/http/dlink_upnp_exec_noauthDifferent D-Link Routers are vulnerable to OS command injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This module has been tested on DIR-865 and DIR-645 devices. Authors: - Mi -
Realtek SDK Miniigd UPnP SOAP Command Execution
Disclosure Date: 2015-04-24First seen: 2020-04-26exploit/linux/http/realtek_miniigd_upnp_exec_noauthDifferent devices using the Realtek SDK with the miniigd daemon are vulnerable to OS command injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This module has been tested successfully on
CVSS scores for CVE-2014-8361
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-06-27 |
References for CVE-2014-8361
-
http://jvn.jp/en/jp/JVN47580234/index.html
JVN#47580234: Multiple vulnerabilities in multiple ELECOM productsThird Party Advisory
-
http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html
Realtek SDK Miniigd UPnP SOAP Command Execution ≈ Packet StormThird Party Advisory;VDB Entry
-
https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055
D-Link Technical SupportThird Party Advisory
-
https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/
New HinataBot Exploits CVE-2014-8361 in DDoS AttacksThird Party Advisory
-
http://www.securityfocus.com/bid/74330
Realtek rtl81xx SDK CVE-2014-8361 Remote Code Execution VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://jvn.jp/en/jp/JVN67456944/index.html
JVN#67456944: Multiple vulnerabilities in multiple Aterm productsThird Party Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-15-155/
ZDI-15-155 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/37169/
Realtek SDK - Miniigd UPnP SOAP Command Execution (Metasploit) - Linux remote ExploitThird Party Advisory;VDB Entry
-
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055
D-Link Technical SupportVendor Advisory
Jump to