CVE-2014-8361
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2015
Last modified:
22/10/2025
Description
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:* | 2.05b01 (including) | |
| cpe:2.3:h:dlink:dir-905l:a1:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:dir-905l:b1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:* | 1.14b06 (including) | |
| cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:* | 1.15 (including) | |
| cpe:2.3:h:dlink:dir-600l:a1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:* | 1.15 (including) | |
| cpe:2.3:h:dlink:dir-619l:a1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:* | 2.07b02 (including) | |
| cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:* | 2.07b02 (including) | |
| cpe:2.3:h:dlink:dir-605l:b1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:* | 3.03b07 (including) | |
| cpe:2.3:h:dlink:dir-605l:c1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://jvn.jp/en/jp/JVN47580234/index.html
- http://jvn.jp/en/jp/JVN67456944/index.html
- http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055
- http://www.securityfocus.com/bid/74330
- http://www.zerodayinitiative.com/advisories/ZDI-15-155/
- https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/
- https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055
- https://www.exploit-db.com/exploits/37169/
- http://jvn.jp/en/jp/JVN47580234/index.html
- http://jvn.jp/en/jp/JVN67456944/index.html
- http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055
- http://www.securityfocus.com/bid/74330
- http://www.zerodayinitiative.com/advisories/ZDI-15-155/
- https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/
- https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055
- https://www.exploit-db.com/exploits/37169/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361



