The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
17 Nov 2023, 20:01
Type | Values Removed | Values Added |
---|---|---|
CPE |
08 Nov 2023, 20:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dlink dir-850l Firmware
|
|
CPE | cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:* cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:* |
Information
Published : 2017-09-13 17:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-14419
Mitre link : CVE-2017-14419
CVE.ORG link : CVE-2017-14419
JSON object : View
Products Affected
dlink
- dir-850l
- dir-850l_firmware
CWE
CWE-295
Improper Certificate Validation