Description
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-7707 | D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin. |
References
History
No history.
Subscriptions
D-link
Subscribe
Dnr-326 Firmware
Subscribe
Dns-320b Firmware
Subscribe
Dns-320l Firmware
Subscribe
Dns-322l Firmware
Subscribe
Dns-325 Firmware
Subscribe
Dns-327l Firmware
Subscribe
Dns-345 Firmware
Subscribe
Dlink
Subscribe
Dnr-326
Subscribe
Dns-320b
Subscribe
Dns-320l
Subscribe
Dns-322l
Subscribe
Dns-325
Subscribe
Dns-327l
Subscribe
Dns-345
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:03:27.574Z
Reserved: 2014-10-03T00:00:00.000Z
Link: CVE-2014-7857
No data.
Status : Modified
Published: 2017-08-25T18:29:00.230
Modified: 2026-05-13T00:24:29.033
Link: CVE-2014-7857
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD