Vulnerability Details CVE-2014-8361
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.941
EPSS Ranking 99.9%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Proposed Action
Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.
Ransomware Campaign
Unknown
Products affected by CVE-2014-8361
-
cpe:2.3:a:realtek:realtek_sdk:-
-
cpe:2.3:h:aterm:w1200ex-ms:-
-
cpe:2.3:h:aterm:w1200ex:-
-
-
-
cpe:2.3:h:aterm:wf300hp2:-
-
cpe:2.3:h:aterm:wf800hp:-
-
cpe:2.3:h:aterm:wg1200hp2:-
-
cpe:2.3:h:aterm:wg1200hp3:-
-
cpe:2.3:h:aterm:wg1200hp:-
-
cpe:2.3:h:aterm:wg1200hs2:-
-
cpe:2.3:h:aterm:wg1200hs:-
-
cpe:2.3:h:aterm:wg1800hp3:-
-
cpe:2.3:h:aterm:wg1800hp4:-
-
cpe:2.3:h:aterm:wg1900hp2:-
-
cpe:2.3:h:aterm:wg1900hp:-
-
cpe:2.3:h:aterm:wr8165n:-
-
cpe:2.3:h:dlink:dir-501:a1
-
cpe:2.3:h:dlink:dir-515:a1
-
cpe:2.3:h:dlink:dir-600l:a1
-
cpe:2.3:h:dlink:dir-600l:b1
-
cpe:2.3:h:dlink:dir-605l:a1
-
cpe:2.3:h:dlink:dir-605l:b1
-
cpe:2.3:h:dlink:dir-605l:c1
-
cpe:2.3:h:dlink:dir-615:fx
-
cpe:2.3:h:dlink:dir-615:j1
-
cpe:2.3:h:dlink:dir-619l:a1
-
cpe:2.3:h:dlink:dir-619l:b1
-
cpe:2.3:h:dlink:dir-809:a1
-
cpe:2.3:h:dlink:dir-809:a2
-
cpe:2.3:h:dlink:dir-900l:a1
-
cpe:2.3:h:dlink:dir-905l:a1
-
cpe:2.3:h:dlink:dir-905l:b1
-
cpe:2.3:o:aterm:w1200ex-ms_firmware:-
-
cpe:2.3:o:aterm:w1200ex-ms_firmware:1.3.1
-
cpe:2.3:o:aterm:w1200ex_firmware:1.3.1
-
cpe:2.3:o:aterm:w300p_firmware:-
-
cpe:2.3:o:aterm:w500p_firmware:-
-
cpe:2.3:o:aterm:wf300hp2_firmware:-
-
cpe:2.3:o:aterm:wf800hp_firmware:1.0.17
-
cpe:2.3:o:aterm:wg1200hp2_firmware:2.5.0
-
cpe:2.3:o:aterm:wg1200hp3_firmware:1.3.1
-
cpe:2.3:o:aterm:wg1200hp_firmware:-
-
cpe:2.3:o:aterm:wg1200hs2_firmware:2.5.0
-
cpe:2.3:o:aterm:wg1200hs_firmware:-
-
cpe:2.3:o:aterm:wg1800hp3_firmware:1.5.1
-
cpe:2.3:o:aterm:wg1800hp4_firmware:1.3.1
-
cpe:2.3:o:aterm:wg1900hp2_firmware:1.3.1
-
cpe:2.3:o:aterm:wg1900hp_firmware:2.5.1
-
cpe:2.3:o:aterm:wr8165n_firmware:-
-
cpe:2.3:o:dlink:dir-501_firmware:1.01b04
-
cpe:2.3:o:dlink:dir-515_firmware:1.01b04
-
cpe:2.3:o:dlink:dir-600l_firmware:1.00
-
cpe:2.3:o:dlink:dir-600l_firmware:1.15
-
cpe:2.3:o:dlink:dir-600l_firmware:1.16
-
cpe:2.3:o:dlink:dir-600l_firmware:2.00
-
cpe:2.3:o:dlink:dir-600l_firmware:2.05
-
cpe:2.3:o:dlink:dir-600l_firmware:2.056b06
-
cpe:2.3:o:dlink:dir-605l_firmware:1.00
-
cpe:2.3:o:dlink:dir-605l_firmware:1.13
-
cpe:2.3:o:dlink:dir-605l_firmware:1.14b06
-
cpe:2.3:o:dlink:dir-605l_firmware:1.17b01
-
cpe:2.3:o:dlink:dir-605l_firmware:2.00
-
cpe:2.3:o:dlink:dir-605l_firmware:2.01mt
-
cpe:2.3:o:dlink:dir-605l_firmware:2.04
-
cpe:2.3:o:dlink:dir-605l_firmware:2.07b02
-
cpe:2.3:o:dlink:dir-605l_firmware:2.08b01
-
cpe:2.3:o:dlink:dir-605l_firmware:2.12b1
-
cpe:2.3:o:dlink:dir-605l_firmware:2.13b01
-
cpe:2.3:o:dlink:dir-605l_firmware:3.03b07
-
cpe:2.3:o:dlink:dir-615_firmware:-
-
cpe:2.3:o:dlink:dir-615_firmware:10.01b02
-
cpe:2.3:o:dlink:dir-615_firmware:2.5.17
-
cpe:2.3:o:dlink:dir-615_firmware:3.03ww
-
cpe:2.3:o:dlink:dir-615_firmware:6.06b03
-
cpe:2.3:o:dlink:dir-619l_firmware:1.00
-
cpe:2.3:o:dlink:dir-619l_firmware:1.15
-
cpe:2.3:o:dlink:dir-619l_firmware:2.00
-
cpe:2.3:o:dlink:dir-619l_firmware:2.02
-
cpe:2.3:o:dlink:dir-619l_firmware:2.03
-
cpe:2.3:o:dlink:dir-619l_firmware:2.04
-
cpe:2.3:o:dlink:dir-619l_firmware:2.06
-
cpe:2.3:o:dlink:dir-619l_firmware:2.06b1
-
cpe:2.3:o:dlink:dir-619l_firmware:2.07b02
-
cpe:2.3:o:dlink:dir-809_firmware:1.00
-
cpe:2.3:o:dlink:dir-809_firmware:1.02
-
cpe:2.3:o:dlink:dir-809_firmware:1.04b02
-
cpe:2.3:o:dlink:dir-900l_firmware:*
-
cpe:2.3:o:dlink:dir-905l_firmware:1.00
-
cpe:2.3:o:dlink:dir-905l_firmware:1.02
-
cpe:2.3:o:dlink:dir-905l_firmware:2.05b01