CVE-2014-8361

CRITICAL KEV

Realtek SDK - RCE

Title source: llm

Description

The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/37169
metasploit WORKING POC NORMAL
by Ricky, Lawshae · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb
metasploit WORKING POC NORMAL
rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/dlink_upnp_exec_noauth.rb

Scores

CVSS v3 9.8
EPSS 0.9399
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2023-09-18
VulnCheck KEV 2015-05-01
InTheWild.io 2022-12-22
ENISA EUVD EUVD-2014-8198

Classification

Status draft

Affected Products (27)

dlink/dir-905l_firmware < 2.05b01
dlink/dir-605l_firmware < 1.14b06
dlink/dir-600l_firmware < 1.15
dlink/dir-619l_firmware < 1.15
dlink/dir-809_firmware < 1.04b02
dlink/dir-900l_firmware < 1.15b01
realtek/realtek_sdk
dlink/dir-501_firmware < 1.01b04
dlink/dir-515_firmware < 1.01b04
dlink/dir-615_firmware
dlink/dir-615_firmware < 6.06b03
aterm/wg1900hp2_firmware < 1.3.1
aterm/wg1900hp_firmware < 2.5.1
aterm/wg1800hp4_firmware < 1.3.1
aterm/wg1800hp3_firmware < 1.5.1
... and 12 more

Timeline

Published May 01, 2015
KEV Added Sep 18, 2023
Tracked Since Feb 18, 2026