Critical severity9.8NVD Advisory· Published Aug 25, 2017· Updated May 13, 2026
CVE-2014-7857
CVE-2014-7857
Description
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
Affected products
7Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.htmlnvdThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2015/May/125nvdMailing ListThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/74880nvdThird Party AdvisoryVDB Entry
- www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdfnvdTechnical Description
- www.securityfocus.com/archive/1/535626/100/200/threadednvd
News mentions
0No linked articles in our index yet.