CVE-2014-8886

AVM FRITZ!OS before 6.30 extracts the contents of firmware updates before verifying their cryptographic signature, which allows remote attackers to create symlinks or overwrite critical files, and consequently execute arbitrary code, via a crafted firmware image.
Configurations

Configuration 1 (hide)

cpe:2.3:o:avm:fritz\!_os:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Execution-Via-Firmware-Images.html - () http://packetstormsecurity.com/files/135161/AVM-FRITZ-Box-Arbitrary-Code-Execution-Via-Firmware-Images.html -
References () http://seclists.org/fulldisclosure/2016/Jan/12 - Exploit () http://seclists.org/fulldisclosure/2016/Jan/12 - Exploit
References () http://www.securityfocus.com/archive/1/537246/100/0/threaded - () http://www.securityfocus.com/archive/1/537246/100/0/threaded -
References () https://avm.de/service/sicherheitsinfos-zu-updates/ - Vendor Advisory () https://avm.de/service/sicherheitsinfos-zu-updates/ - Vendor Advisory
References () https://www.redteam-pentesting.de/advisories/rt-sa-2014-014 - Exploit () https://www.redteam-pentesting.de/advisories/rt-sa-2014-014 - Exploit

Information

Published : 2016-01-08 20:59

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8886

Mitre link : CVE-2014-8886

CVE.ORG link : CVE-2014-8886


JSON object : View

Products Affected

avm

  • fritz\!_os
CWE
CWE-310

Cryptographic Issues