CVE-2014-3936
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
02/06/2014
Last modified:
12/04/2025
Description
Stack-based buffer overflow in the do_hnap function in www/my_cgi.cgi in D-Link DSP-W215 (Rev. A1) with firmware 1.01b06 and earlier, DIR-505 with firmware before 1.08b10, and DIR-505L with firmware 1.01 and earlier allows remote attackers to execute arbitrary code via a long Content-Length header in a GetDeviceSettings action in an HNAP request.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:dlink:dir505_shareport_mobile_companion_firmware:*:*:*:*:*:*:*:* | 1.07 (including) | |
cpe:2.3:h:dlink:dir505_shareport_mobile_companion:a1:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dir505l_shareport_mobile_companion_firmware:*:*:*:*:*:*:*:* | 1.01 (including) | |
cpe:2.3:h:dlink:dir-505l_shareport_mobile_companion:a1:*:*:*:*:*:*:* | ||
cpe:2.3:o:dlink:dsp-w215_firmware:*:b06:*:*:*:*:*:* | 1.01 (including) | |
cpe:2.3:h:dlink:dsp-w215:a1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/127427/D-Link-HNAP-Request-Remote-Buffer-Overflow.html
- http://secunia.com/advisories/58728
- http://secunia.com/advisories/58972
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10027
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10029
- http://www.devttys0.com/2014/05/hacking-the-d-link-dsp-w215-smart-plug
- http://www.securityfocus.com/bid/67651
- http://packetstormsecurity.com/files/127427/D-Link-HNAP-Request-Remote-Buffer-Overflow.html
- http://secunia.com/advisories/58728
- http://secunia.com/advisories/58972
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10027
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10029
- http://www.devttys0.com/2014/05/hacking-the-d-link-dsp-w215-smart-plug
- http://www.securityfocus.com/bid/67651