{"api_version":"1","generated_at":"2026-04-23T11:32:16+00:00","cve":"CVE-2014-8361","urls":{"html":"https://cve.report/CVE-2014-8361","api":"https://cve.report/api/cve/CVE-2014-8361.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-8361","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-8361"},"summary":{"title":"CVE-2014-8361","description":"The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.","state":"PUBLISHED","assigner":"mitre","published_at":"2015-05-01 15:59:01","updated_at":"2026-04-22 14:27:40"},"problem_types":["NVD-CWE-noinfo","n/a","CWE-noinfo Not enough information"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055","name":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"D-Link Technical Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html","name":"http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"Realtek SDK Miniigd UPnP SOAP Command Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/","name":"https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"New HinataBot Exploits CVE-2014-8361 in DDoS Attacks","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-155/","name":"http://www.zerodayinitiative.com/advisories/ZDI-15-155/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"Zero Day Initiative","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/74330","name":"http://www.securityfocus.com/bid/74330","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Realtek rtl81xx SDK CVE-2014-8361 Remote Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055","name":"https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"D-Link Technical Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://jvn.jp/en/jp/JVN47580234/index.html","name":"http://jvn.jp/en/jp/JVN47580234/index.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"JVN#47580234: Multiple vulnerabilities in multiple ELECOM products","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/37169/","name":"https://www.exploit-db.com/exploits/37169/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"Realtek SDK - Miniigd UPnP SOAP Command Execution (Metasploit)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://jvn.jp/en/jp/JVN67456944/index.html","name":"http://jvn.jp/en/jp/JVN67456944/index.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"JVN#67456944: Multiple vulnerabilities in multiple Aterm products","mime":"text/xml","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-8361","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8361","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[{"source":"ADP","time":"2023-09-18T00:00:00.000Z","lang":"en","value":"CVE-2014-8361 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"w1200ex","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"w1200ex-ms","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"w1200ex-ms_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"w1200ex_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"w300p","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"w300p_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"w500p","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"w500p_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wf300hp2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wf300hp2_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wf800hp","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wf800hp_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1200hp","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1200hp2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"2.5.0","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1200hp2_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1200hp3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1200hp3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1200hp_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1200hs","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1200hs2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"2.5.0","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1200hs2_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1200hs_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1800hp3","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.5.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1800hp3_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1800hp4","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1800hp4_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1900hp","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wg1900hp2","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1900hp2_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"2.5.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wg1900hp_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"aterm","cpe5":"wr8165n","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"aterm","cpe5":"wr8165n_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-501","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.01b04","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-501_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-515","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.01b04","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-515_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-600l","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-600l","cpe6":"b1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.15","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-600l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"2.056b06","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-600l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-605l","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-605l","cpe6":"b1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-605l","cpe6":"c1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.14b06","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-605l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"2.07b02","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-605l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"3.03b07","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-605l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-615","cpe6":"fx","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-615","cpe6":"j1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-615_firmware","cpe6":"10.01b02","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"6.06b03","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-615_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-619l","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-619l","cpe6":"b1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.15","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-619l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"2.07b02","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-619l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-809","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-809","cpe6":"a2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"1.04b02","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-809_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-900l","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-900l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-905l","cpe6":"a1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"dlink","cpe5":"dir-905l","cpe6":"b1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"2.05b01","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"dlink","cpe5":"dir-905l_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"8361","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realtek","cpe5":"realtek_sdk","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2014","cve_id":"8361","cve":"CVE-2014-8361","vendorProject":"Realtek","product":"SDK","vulnerabilityName":"Realtek SDK Improper Input Validation Vulnerability","dateAdded":"2023-09-18","shortDescription":"Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-10-09","knownRansomwareCampaignUse":"Unknown","notes":"https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361","cwes":"CWE-20","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2014","cve_id":"8361","cve":"CVE-2014-8361","epss":"0.939920000","percentile":"0.998920000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:15"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T13:18:47.756Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-155/"},{"tags":["x_transferred"],"url":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"},{"tags":["x_transferred"],"url":"http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"},{"name":"74330","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/74330"},{"name":"37169","tags":["exploit","x_transferred"],"url":"https://www.exploit-db.com/exploits/37169/"},{"name":"JVN#47580234","tags":["third-party-advisory","x_transferred"],"url":"http://jvn.jp/en/jp/JVN47580234/index.html"},{"name":"JVN#67456944","tags":["third-party-advisory","x_transferred"],"url":"http://jvn.jp/en/jp/JVN67456944/index.html"},{"tags":["x_transferred"],"url":"https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"},{"tags":["x_transferred"],"url":"https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2014-8361","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-02-07T21:57:55.692724Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2023-09-18","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"description":"CWE-noinfo Not enough information","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-21T23:56:01.609Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-8361"}],"timeline":[{"lang":"en","time":"2023-09-18T00:00:00.000Z","value":"CVE-2014-8361 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2015-04-30T00:00:00.000Z","descriptions":[{"lang":"en","value":"The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2023-09-05T21:35:13.232Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-155/"},{"url":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"},{"url":"http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html"},{"name":"74330","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/74330"},{"name":"37169","tags":["exploit"],"url":"https://www.exploit-db.com/exploits/37169/"},{"name":"JVN#47580234","tags":["third-party-advisory"],"url":"http://jvn.jp/en/jp/JVN47580234/index.html"},{"name":"JVN#67456944","tags":["third-party-advisory"],"url":"http://jvn.jp/en/jp/JVN67456944/index.html"},{"url":"https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/"},{"url":"https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055"}]}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2014-8361","datePublished":"2015-05-01T00:00:00.000Z","dateReserved":"2014-10-20T00:00:00.000Z","dateUpdated":"2025-10-21T23:56:01.609Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2015-05-01 15:59:01","lastModifiedDate":"2026-04-22 14:27:40","problem_types":["NVD-CWE-noinfo","n/a","CWE-noinfo Not enough information"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-905l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.05b01","matchCriteriaId":"05CB91FD-6322-48FB-8CCE-3E7DDB622063"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-905l:a1:*:*:*:*:*:*:*","matchCriteriaId":"F50CC55A-1EA1-4096-8489-1CE1E991B305"},{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-905l:b1:*:*:*:*:*:*:*","matchCriteriaId":"21EDEA1E-6F3C-4E92-A732-270D1E086576"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.14b06","matchCriteriaId":"01D15D52-C442-4ABE-917C-A50908082089"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:*","matchCriteriaId":"CA9038E9-8519-4DC7-8843-74ADB3527A3F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.15","matchCriteriaId":"90962768-A07F-4A1E-9500-F743FD1ECA96"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-600l:a1:*:*:*:*:*:*:*","matchCriteriaId":"F75E7D9C-03BE-4301-AF9E-9929C33F4EEA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.15","matchCriteriaId":"22544CBE-CE28-4E13-99CD-9855A76F8EDF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-619l:a1:*:*:*:*:*:*:*","matchCriteriaId":"3271958C-23CD-4937-A21A-905A18ECA736"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-619l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.07b02","matchCriteriaId":"2FCD4837-81DE-4C00-AC6C-0E7D6036E1D6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*","matchCriteriaId":"6F28B093-482C-4105-A89D-8B1F1FFD59E9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.07b02","matchCriteriaId":"89CE2A47-DC82-49A7-874E-C9533E153ECF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-605l:b1:*:*:*:*:*:*:*","matchCriteriaId":"1B1FC91F-1B77-406F-ADB5-98B07866601E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.03b07","matchCriteriaId":"7B8247C1-8A71-4004-8ECE-1984335D697D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-605l:c1:*:*:*:*:*:*:*","matchCriteriaId":"4DD38B14-B291-423A-912C-B1BB2070A9C9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-600l_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.056b06","matchCriteriaId":"C66EAA7D-A420-4CBF-AD01-754983012129"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-600l:b1:*:*:*:*:*:*:*","matchCriteriaId":"6966FB89-8C98-4FA3-B4CA-21CAD495A830"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-809_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.04b02","matchCriteriaId":"4CCC25F5-5E8A-4164-84D8-DDC0D3519E2B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-809:a1:*:*:*:*:*:*:*","matchCriteriaId":"184F3169-C4BE-4ABF-AFED-B8D39522092F"},{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-809:a2:*:*:*:*:*:*:*","matchCriteriaId":"6CE2F27F-A180-4459-8D73-5544568BB53D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-900l_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.15b01","matchCriteriaId":"F3757810-6826-4389-8621-A87267D71B64"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-900l:a1:*:*:*:*:*:*:*","matchCriteriaId":"2396542D-7E98-41B4-9BF1-31CE699B0FF9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realtek:realtek_sdk:-:*:*:*:*:*:*:*","matchCriteriaId":"62471288-17B2-4FCA-A673-CC4B24FB6262"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-501_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.01b04","matchCriteriaId":"1C1339C5-FD81-4885-AF24-A05BC1A3B02A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-501:a1:*:*:*:*:*:*:*","matchCriteriaId":"7A8C6464-A044-4C0B-8ADB-C2F61C3009E5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-515_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.01b04","matchCriteriaId":"5FA66695-A646-4AB9-B128-A3D87C4C8284"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-515:a1:*:*:*:*:*:*:*","matchCriteriaId":"037A3A92-EC1C-41AC-A93A-7319E8E98240"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-615_firmware:10.01b02:*:*:*:*:*:*:*","matchCriteriaId":"17FD57FF-A596-4151-860C-3F0486CD85F4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-615:j1:*:*:*:*:*:*:*","matchCriteriaId":"30B14CF6-4239-4BAB-ABA0-284AFDA2C9E8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dir-615_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"6.06b03","matchCriteriaId":"F41E73AD-5615-4084-AC4E-516A934303CA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dir-615:fx:*:*:*:*:*:*:*","matchCriteriaId":"63134C26-FEA9-4EF5-97D9-FEDA14B34516"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1900hp2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.1","matchCriteriaId":"A05F11D3-7701-4152-9937-04D7134B4FE6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1900hp2:-:*:*:*:*:*:*:*","matchCriteriaId":"E007A9B5-74FE-4230-9E3E-ACEA89FCABA8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1900hp_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.5.1","matchCriteriaId":"D0DD2168-9BE3-49E8-952D-4775911C04D6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1900hp:-:*:*:*:*:*:*:*","matchCriteriaId":"70FC2B64-D47F-42DF-B9B4-7FB07F98A150"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1800hp4_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.1","matchCriteriaId":"BCE7372C-DB92-419F-877C-CCE0DC3EBD6C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1800hp4:-:*:*:*:*:*:*:*","matchCriteriaId":"B9BB5205-0D2E-43AF-B228-9C728B404EA3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1800hp3_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.5.1","matchCriteriaId":"DBDC178B-2033-47EA-B6CC-99880D5772A2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1800hp3:-:*:*:*:*:*:*:*","matchCriteriaId":"AD47CE10-EBD2-49A9-9F1A-B77A502AC196"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1200hs2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.5.0","matchCriteriaId":"424AB1C2-6C52-4416-8983-53D4BCAA0F80"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1200hs2:-:*:*:*:*:*:*:*","matchCriteriaId":"BC88BDE5-19B4-4EF4-8C14-2DEB8EAD3D91"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1200hp3_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.1","matchCriteriaId":"7ED15E56-530C-42A3-B3D3-9F1090C524D5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1200hp3:-:*:*:*:*:*:*:*","matchCriteriaId":"F13C13D3-FB31-4E20-A5D4-992D4CF6BBCC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1200hp2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.5.0","matchCriteriaId":"F7FDD550-9FDE-4001-933E-51FF4FBDC5AA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1200hp2:-:*:*:*:*:*:*:*","matchCriteriaId":"347DFD5E-56E0-473F-A2B1-E3FD2E99573A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:w1200ex_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.1","matchCriteriaId":"88A2A125-9991-459A-99D2-5158B72372BD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:w1200ex:-:*:*:*:*:*:*:*","matchCriteriaId":"A6D0D008-E851-4756-87E4-5FA60EE65040"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:w1200ex-ms_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.1","matchCriteriaId":"C69CCDC3-BB41-45F2-987D-674FAD937F40"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:w1200ex-ms:-:*:*:*:*:*:*:*","matchCriteriaId":"EBD0A960-9FA2-4838-A867-7AC688749771"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1200hs_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"8C5C80AB-4775-4D46-9FC7-C341CEAB08A0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1200hs:-:*:*:*:*:*:*:*","matchCriteriaId":"05C494FC-4284-4325-A05C-DDAAF86857F7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wg1200hp_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"BC81201F-93A7-4B54-A7FE-51E4FD12AE54"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wg1200hp:-:*:*:*:*:*:*:*","matchCriteriaId":"E80DDB01-BA42-40E1-91A3-EBFCEC3F8A49"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wf800hp_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"4D83ABC6-AB7F-494C-B386-EB4212F50C55"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wf800hp:-:*:*:*:*:*:*:*","matchCriteriaId":"141077D2-4439-44AA-9BD1-C60E253B4C6F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wf300hp2_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"0EF09945-D1B9-45FF-87DF-1573DB5F51BC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wf300hp2:-:*:*:*:*:*:*:*","matchCriteriaId":"514DD5D5-E44F-432E-AE87-25DDA62636AB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:wr8165n_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"08699FDC-5E04-4CF3-9C9A-9231795A6420"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:wr8165n:-:*:*:*:*:*:*:*","matchCriteriaId":"90FC20CF-70E5-4E50-A383-E24CB0987280"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:w500p_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"54E372D5-C699-4ED4-9AB3-326ADC9834BB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:w500p:-:*:*:*:*:*:*:*","matchCriteriaId":"C9CC1968-0B25-4324-AB07-688B32770220"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:aterm:w300p_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"6B02F690-7098-4C8C-B453-3EC8C01F0343"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:aterm:w300p:-:*:*:*:*:*:*:*","matchCriteriaId":"A810B81E-8EE7-4F63-9380-7C68CB33B404"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"8361","Ordinal":"1","Title":"CVE-2014-8361","CVE":"CVE-2014-8361","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"8361","Ordinal":"1","NoteData":"The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.","Type":"Description","Title":"CVE-2014-8361"},{"CveYear":"2014","CveId":"8361","Ordinal":"2","NoteData":"2015-05-01","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"8361","Ordinal":"3","NoteData":"2021-04-09","Type":"Other","Title":"Modified"}]}}}