D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-09-13T17:00:00
Updated: 2017-09-13T17:57:02
Reserved: 2017-09-13T00:00:00
Link: CVE-2017-14422
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-09-13T17:29:00.573
Modified: 2023-11-08T20:59:19.633
Link: CVE-2017-14422
JSON object: View
Redhat Information
No data.
CWE