The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html | Exploit Third Party Advisory |
https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html - Exploit, Third Party Advisory |
26 Apr 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:* |
Information
Published : 2017-09-13 17:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14420
Mitre link : CVE-2017-14420
CVE.ORG link : CVE-2017-14420
JSON object : View
Products Affected
dlink
- dir-850l_firmware
- dir-850l
CWE
CWE-295
Improper Certificate Validation