Description
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-7707 | D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin. |
References
History
No history.
Subscriptions
D-link
Subscribe
Dnr-326 Firmware
Subscribe
Dns-320b Firmware
Subscribe
Dns-320l Firmware
Subscribe
Dns-322l Firmware
Subscribe
Dns-325 Firmware
Subscribe
Dns-327l Firmware
Subscribe
Dns-345 Firmware
Subscribe
Dlink
Subscribe
Dnr-326
Subscribe
Dns-320b
Subscribe
Dns-320l
Subscribe
Dns-322l
Subscribe
Dns-325
Subscribe
Dns-327l
Subscribe
Dns-345
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:03:27.574Z
Reserved: 2014-10-03T00:00:00.000Z
Link: CVE-2014-7857
No data.
Status : Deferred
Published: 2017-08-25T18:29:00.230
Modified: 2025-04-20T01:37:25.860
Link: CVE-2014-7857
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD