9.8

CVE-2014-7859

Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows remote attackers to execute arbitrary code by crafting malformed "Host" and "Referer" header values.

Data is provided by the National Vulnerability Database (NVD)
D-linkDns-322l Firmware Version <= 2.00b07
   DlinkDns-322l Version-
D-linkDns-320lw Firmware Version <= 1.03b04
   DlinkDns-320lw Version-
D-linkDnr-326 Firmware Version <= 1.40b03
   DlinkDnr-326 Version-
D-linkDns-327l Firmware Version <= 1.02
   DlinkDns-327l Version-
D-linkDnr-320l Firmware Version <= 1.03b04
   DlinkDnr-320l Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 11.42% 0.93
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.