AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and consequently execute arbitrary code, via a crafted firmware image.
References
Configurations
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Execution-Via-Firmware-Images.html - | |
References | () http://seclists.org/fulldisclosure/2016/Jan/12 - Exploit | |
References | () http://www.securityfocus.com/archive/1/537246/100/0/threaded - | |
References | () https://avm.de/service/sicherheitsinfos-zu-updates/ - Vendor Advisory | |
References | () https://www.redteam-pentesting.de/advisories/rt-sa-2014-014 - Exploit |
Information
Published : 2016-01-08 20:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8886
Mitre link : CVE-2014-8886
CVE.ORG link : CVE-2014-8886
JSON object : View
Products Affected
avm
- fritz\!_os
CWE
CWE-310
Cryptographic Issues