CVE-2014-8361
CRITICAL KEVRealtek SDK - RCE
Title source: llmDescription
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/37169
metasploit
WORKING POC
NORMAL
by Ricky, Lawshae · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb
metasploit
WORKING POC
NORMAL
rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/dlink_upnp_exec_noauth.rb
References (10)
Scores
CVSS v3
9.8
EPSS
0.9399
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2023-09-18
VulnCheck KEV
2015-05-01
InTheWild.io
2022-12-22
ENISA EUVD
EUVD-2014-8198
Classification
Status
draft
Affected Products (27)
dlink/dir-905l_firmware
< 2.05b01
dlink/dir-605l_firmware
< 1.14b06
dlink/dir-600l_firmware
< 1.15
dlink/dir-619l_firmware
< 1.15
dlink/dir-809_firmware
< 1.04b02
dlink/dir-900l_firmware
< 1.15b01
realtek/realtek_sdk
dlink/dir-501_firmware
< 1.01b04
dlink/dir-515_firmware
< 1.01b04
dlink/dir-615_firmware
dlink/dir-615_firmware
< 6.06b03
aterm/wg1900hp2_firmware
< 1.3.1
aterm/wg1900hp_firmware
< 2.5.1
aterm/wg1800hp4_firmware
< 1.3.1
aterm/wg1800hp3_firmware
< 1.5.1
... and 12 more
Timeline
Published
May 01, 2015
KEV Added
Sep 18, 2023
Tracked Since
Feb 18, 2026