Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:CTS:REALTEK-SDK-COMMAND-IN

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Realtek SDK Miniigd UPnP SOAP Command Execution

Release Date

2019/10/22

Update Number

3219

Supported Platforms

idp-4.0+, isg-3.4+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Realtek SDK Miniigd UPnP SOAP Command Execution


This signature detects attempts to exploit a known vulnerability against Realtek SDK. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

Affected Products

  • D-link dir-600l_firmware 1.15
  • D-link dir-600l_firmware 2.05
  • D-link dir-605l_firmware 1.13
  • D-link dir-605l_firmware 2.04
  • D-link dir-619l_firmware 1.15
  • D-link dir-619l_firmware 2.03
  • D-link dir-809_firmware 1.02
  • D-link dir-905l_firmware 1.02
  • Realtek realtek_sdk -

References

  • BugTraq: 74330
  • CVE: CVE-2014-8361

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out