Critical severity9.8NVD Advisory· Published Aug 25, 2017· Updated May 13, 2026
CVE-2014-7859
CVE-2014-7859
Description
Stack-based buffer overflow in login_mgr.cgi in D-Link firmware DNR-320L and DNS-320LW before 1.04b08, DNR-322L before 2.10 build 03, DNR-326 before 2.10 build 03, and DNS-327L before 1.04b01 allows remote attackers to execute arbitrary code by crafting malformed "Host" and "Referer" header values.
Affected products
5Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- packetstormsecurity.com/files/132075/D-Link-Bypass-Buffer-Overflow.htmlnvdThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2015/May/125nvdMailing ListThird Party AdvisoryVDB Entry
- www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdfnvdTechnical DescriptionThird Party Advisory
- www.securityfocus.com/archive/1/535626/100/200/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/74878nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.