CVE-2017-14429: n/a in n/a
The DHCP client on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allows unauthenticated remote code execution as root because /etc/services/INET/inet_ipv4.php mishandles shell metacharacters, affecting generated files such as WAN-1-udhcpc.sh.
AI Analysis
Technical Summary
CVE-2017-14429 is a critical remote code execution vulnerability affecting certain D-Link DIR-850L routers, specifically REV. A devices with firmware versions up to FW114WWb07_h2ab_beta1 and REV. B devices with firmware versions up to FW208WWb02. The vulnerability arises from improper handling of shell metacharacters in the DHCP client component, specifically within the /etc/services/INET/inet_ipv4.php script. This script is responsible for generating files such as WAN-1-udhcpc.sh, which are used in the router's DHCP client operations. Because the input is not properly sanitized, an attacker can inject shell metacharacters remotely without authentication, leading to arbitrary command execution with root privileges. This means an attacker can fully compromise the device, potentially gaining control over the router's configuration, intercepting or redirecting network traffic, or using the device as a foothold for further attacks within the network. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating a command injection flaw. The CVSS v3.1 base score is 9.8, reflecting the high impact and ease of exploitation (network vector, no privileges or user interaction required). Although no known exploits in the wild have been reported, the severity and nature of the flaw make it a significant threat to affected devices.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for small and medium enterprises or branch offices that rely on D-Link DIR-850L routers for internet connectivity. Successful exploitation can lead to full compromise of the router, allowing attackers to intercept sensitive communications, manipulate DNS settings to redirect traffic to malicious sites, or establish persistent backdoors. This can result in data breaches, loss of confidentiality, integrity violations, and disruption of availability. Given the router's role as a network gateway, the impact extends beyond the device itself to the entire internal network, potentially enabling lateral movement and further compromise of corporate assets. The lack of authentication and user interaction requirements means attackers can exploit this remotely and silently, increasing the risk of widespread undetected attacks. Additionally, the vulnerability could be leveraged in botnet campaigns or as part of supply chain attacks targeting European organizations.
Mitigation Recommendations
Organizations should immediately identify if they use D-Link DIR-850L REV. A or REV. B routers with the affected firmware versions. Since no official patches are linked, mitigation should include: 1) Upgrading firmware to the latest version provided by D-Link that addresses this vulnerability or, if unavailable, replacing the affected devices with models that have patched firmware. 2) Restricting remote management access to the routers by disabling WAN-side administration and ensuring management interfaces are only accessible from trusted internal networks. 3) Implementing network segmentation to isolate critical systems from devices with known vulnerabilities. 4) Monitoring network traffic for unusual DHCP or WAN interface activity that could indicate exploitation attempts. 5) Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting command injection attempts on DHCP client scripts. 6) Regularly auditing router configurations and logs for signs of compromise. 7) Educating IT staff about this vulnerability to ensure rapid response if exploitation is suspected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2017-14429: n/a in n/a
Description
The DHCP client on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allows unauthenticated remote code execution as root because /etc/services/INET/inet_ipv4.php mishandles shell metacharacters, affecting generated files such as WAN-1-udhcpc.sh.
AI-Powered Analysis
Technical Analysis
CVE-2017-14429 is a critical remote code execution vulnerability affecting certain D-Link DIR-850L routers, specifically REV. A devices with firmware versions up to FW114WWb07_h2ab_beta1 and REV. B devices with firmware versions up to FW208WWb02. The vulnerability arises from improper handling of shell metacharacters in the DHCP client component, specifically within the /etc/services/INET/inet_ipv4.php script. This script is responsible for generating files such as WAN-1-udhcpc.sh, which are used in the router's DHCP client operations. Because the input is not properly sanitized, an attacker can inject shell metacharacters remotely without authentication, leading to arbitrary command execution with root privileges. This means an attacker can fully compromise the device, potentially gaining control over the router's configuration, intercepting or redirecting network traffic, or using the device as a foothold for further attacks within the network. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating a command injection flaw. The CVSS v3.1 base score is 9.8, reflecting the high impact and ease of exploitation (network vector, no privileges or user interaction required). Although no known exploits in the wild have been reported, the severity and nature of the flaw make it a significant threat to affected devices.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for small and medium enterprises or branch offices that rely on D-Link DIR-850L routers for internet connectivity. Successful exploitation can lead to full compromise of the router, allowing attackers to intercept sensitive communications, manipulate DNS settings to redirect traffic to malicious sites, or establish persistent backdoors. This can result in data breaches, loss of confidentiality, integrity violations, and disruption of availability. Given the router's role as a network gateway, the impact extends beyond the device itself to the entire internal network, potentially enabling lateral movement and further compromise of corporate assets. The lack of authentication and user interaction requirements means attackers can exploit this remotely and silently, increasing the risk of widespread undetected attacks. Additionally, the vulnerability could be leveraged in botnet campaigns or as part of supply chain attacks targeting European organizations.
Mitigation Recommendations
Organizations should immediately identify if they use D-Link DIR-850L REV. A or REV. B routers with the affected firmware versions. Since no official patches are linked, mitigation should include: 1) Upgrading firmware to the latest version provided by D-Link that addresses this vulnerability or, if unavailable, replacing the affected devices with models that have patched firmware. 2) Restricting remote management access to the routers by disabling WAN-side administration and ensuring management interfaces are only accessible from trusted internal networks. 3) Implementing network segmentation to isolate critical systems from devices with known vulnerabilities. 4) Monitoring network traffic for unusual DHCP or WAN interface activity that could indicate exploitation attempts. 5) Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting command injection attempts on DHCP client scripts. 6) Regularly auditing router configurations and logs for signs of compromise. 7) Educating IT staff about this vulnerability to ensure rapid response if exploitation is suspected.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2017-09-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbda595
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/3/2025, 8:41:27 AM
Last updated: 8/16/2025, 10:13:44 PM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.