
CVE-2017-14414
https://notcve.org/view.php?id=CVE-2017-14414
13 Sep 2017 — D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/shareport.php. Los dispositivos D-Link DIR-850L REV. A con versiones de firmware hasta FW114WWb07_h2ab_beta1 tienen una vulnerabilidad de Cross-Site Scripting (XSS) en el parámetro action en htdocs/web/shareport.php. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-14415
https://notcve.org/view.php?id=CVE-2017-14415
13 Sep 2017 — D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/sitesurvey.php. Los dispositivos D-Link DIR-850L REV. A con versiones de firmware hasta FW114WWb07_h2ab_beta1 tienen una vulnerabilidad de Cross-Site Scripting (XSS) en el parámetro action para htdocs/web/sitesurvey.php. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-14416
https://notcve.org/view.php?id=CVE-2017-14416
13 Sep 2017 — D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/wandetect.php. Los dispositivos D-Link DIR-850L REV. A con versiones de firmware hasta FW114WWb07_h2ab_beta1 tienen una vulnerabilidad de Cross-Site Scripting (XSS) en el parámetro action para htdocs/web/wandetect.php. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-14417
https://notcve.org/view.php?id=CVE-2017-14417
13 Sep 2017 — register_send.php on D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices does not require authentication, which can result in unintended enrollment in mydlink Cloud Services. register_send.php en dispositivos D-Link DIR-850L REV. B (con firmware hasta la versión FW208WWb02) no requiere autenticación, lo que puede resultar en una inscripción involuntaria en mydlink Cloud Services. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-306: Missing Authentication for Critical Function •

CVE-2017-14418
https://notcve.org/view.php?id=CVE-2017-14418
13 Sep 2017 — The D-Link NPAPI extension, as used in conjunction with D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices, sends the cleartext admin password over the Internet as part of interaction with mydlink Cloud Services. La extensión D-Link NPAPI, tal y como se emplea conjuntamente con dispositivos D-Link DIR-850L REV. B (con firmware hasta la versión FW208WWb02) envía la contraseña de administrador en texto claro a través de Internet como parte de la interacción con mydlink Cloud Services. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-522: Insufficiently Protected Credentials •

CVE-2017-14419
https://notcve.org/view.php?id=CVE-2017-14419
13 Sep 2017 — The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, participates in mydlink Cloud Services by establishing a TCP relay service for HTTP, even though a TCP relay service for HTTPS is also established. La extensión D-Link NPAPI, tal y como se emplea conjuntamente con dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-295: Improper Certificate Validation •

CVE-2017-14420
https://notcve.org/view.php?id=CVE-2017-14420
13 Sep 2017 — The D-Link NPAPI extension, as used on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. La extensión D-Link NPAPI, tal y como se emplea conjuntamente con dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-295: Improper Certificate Validation •

CVE-2017-14421
https://notcve.org/view.php?id=CVE-2017-14421
13 Sep 2017 — D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session. Los dispositivos D-Link DIR-850L REV. B (con firmware hasta la versión FW208WWb02) tienen una contraseña embebida de wrgac25_dlink.2013gui_dir850l para la cuenta Alphanetworks al restablecer el dispositivo, lo que permite que atacantes remotos obtengan acceso root... • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •

CVE-2017-14422
https://notcve.org/view.php?id=CVE-2017-14422
13 Sep 2017 — D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices use the same hardcoded /etc/stunnel.key private key across different customers' installations, which allows remote attackers to defeat the HTTPS cryptographic protection mechanisms by leveraging knowledge of this key from another installation. Los dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) y REV. • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-798: Use of Hard-coded Credentials •

CVE-2017-14423
https://notcve.org/view.php?id=CVE-2017-14423
13 Sep 2017 — htdocs/parentalcontrols/bind.php on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices does not prevent unauthenticated nonce-guessing attacks, which makes it easier for remote attackers to change the DNS configuration via a series of requests. htdocs/parentalcontrols/bind.php en dispositivos D-Link DIR-850L REV. A (con firmware hasta la versión FW114WWb07_h2ab_beta1) no evita ataques de adivinación de nonces, lo que facilita que atacantes remotos cambien la configuración de DNS me... • https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html • CWE-307: Improper Restriction of Excessive Authentication Attempts •