The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023.
Link | Tags |
---|---|
http://www.zerodayinitiative.com/advisories/ZDI-15-155/ | vdb entry third party advisory |
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055 | vendor advisory |
http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html | vdb entry third party advisory |
http://www.securityfocus.com/bid/74330 | vdb entry third party advisory broken link |
https://www.exploit-db.com/exploits/37169/ | exploit vdb entry third party advisory |
http://jvn.jp/en/jp/JVN47580234/index.html | third party advisory |
http://jvn.jp/en/jp/JVN67456944/index.html | third party advisory |
https://sensorstechforum.com/hinatabot-cve-2014-8361-ddos/ | third party advisory |
https://web.archive.org/web/20150909230440/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055 | third party advisory |