var-201412-0139
Vulnerability from variot

TP-Link TL-WR740N 4 with firmware 3.17.0 Build 140520, 3.16.6 Build 130529, and 3.16.4 Build 130205 allows remote attackers to cause a denial of service (httpd crash) via vectors involving a "new" value in the isNew parameter to PingIframeRpm.htm. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlService disruption by a third party (httpd crash ) There is a possibility of being put into a state. The TP-LINK TL-WR740N is a wireless router device. TP-Link TL-WR740N is prone to a denial-of-service vulnerability. The TL-WR740N is a combined wired/wireless network connection device integrated with internet-sharing router and 4-port switch. The wireless N Router is 802.11b&g compatible based on 802.11n technology and gives you 802.11n performance up to 150Mbps at an even more affordable price. Bordering on 11n and surpassing 11g speed enables high bandwidth consuming applications like video streaming to be more fluid.The TP-Link WR740N Wireless N Router network device is exposed to adenial of service vulnerability when processing a HTTP GET request. Thisissue occurs when the web server (httpd) fails to handle a HTTP GET requestover a given default TCP port 80. Resending the value 'new' to the 'isNew'parameter in 'PingIframeRpm.htm' script to the router thru a proxy willcrash its httpd service denying the legitimate users access to the admincontrol panel management interface. To bring back the http srv and theadmin UI, a user must physically reboot the router.Tested on: Router Webserver. A security vulnerability exists in the PingIframeRpm.htm script of TP-LINK TL-WR740N. The following versions are affected: TP-LINK TL-WR740N version 4 using firmware versions 3.17.0 Build 140520, 3.16.6 Build 130529 and 3.16.4 Build 130205

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201412-0139",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "tp link",
        "version": "4"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tp link",
        "version": "3.17.0"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tp link",
        "version": "3.16.4"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "tp link",
        "version": "3.16.6"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "tp link",
        "version": "3.16.4 build 130205"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "tp link",
        "version": "3.16.6 build 130529"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "tp link",
        "version": "3.17.0 build 140520"
      },
      {
        "model": "tl-wr740n",
        "scope": null,
        "trust": 0.6,
        "vendor": "tp link",
        "version": null
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tp link",
        "version": "3.17.0140520"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tp link",
        "version": "3.16.6130529"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tp link",
        "version": "3.16.4130205"
      },
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tp link",
        "version": "4.23"
      },
      {
        "model": "tl-wr740n build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tp link",
        "version": "3.17.0140520"
      },
      {
        "model": "tl-wr740n build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tp link",
        "version": "3.16.6130529"
      },
      {
        "model": "tl-wr740n build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "tp link",
        "version": "3.16.4130205"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "firmware version: 3.17.0 build 140520 rel.75075n (released: 5/20/2014)"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "firmware version: 3.16.6 build 130529 rel.47286n (released: 5/29/2013)"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "firmware version: 3.16.4 build 130205 rel.63875n (released: 2/5/2013)"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "hardware version: wr740n v4 00000000 (v4.23)"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "model no. tl-wr740n / tl-wr740nd"
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "BID",
        "id": "77725"
      },
      {
        "db": "BID",
        "id": "71255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:tp-link:tl-wr740n",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:tp-link:tl-wr740n_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Gjoko Krstic",
    "sources": [
      {
        "db": "BID",
        "id": "71255"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2014-9350",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-9350",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-08509",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-77295",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-9350",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-9350",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-08509",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201411-466",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "ZSL",
            "id": "ZSL-2014-5210",
            "trust": 0.1,
            "value": "(2/5)"
          },
          {
            "author": "VULHUB",
            "id": "VHN-77295",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "TP-Link TL-WR740N 4 with firmware 3.17.0 Build 140520, 3.16.6 Build 130529, and 3.16.4 Build 130205 allows remote attackers to cause a denial of service (httpd crash) via vectors involving a \"new\" value in the isNew parameter to PingIframeRpm.htm. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlService disruption by a third party (httpd crash ) There is a possibility of being put into a state. The TP-LINK TL-WR740N is a wireless router device. TP-Link TL-WR740N is prone to a denial-of-service vulnerability. The TL-WR740N is a combined wired/wireless network connection device integrated with internet-sharing router and 4-port switch. The wireless N Router is 802.11b\u0026amp;g compatible based on 802.11n technology and gives you 802.11n performance up to 150Mbps at an even more affordable price. Bordering on 11n and surpassing 11g speed enables high bandwidth consuming applications like video streaming to be more fluid.The TP-Link WR740N Wireless N Router network device is exposed to adenial of service vulnerability when processing a HTTP GET request. Thisissue occurs when the web server (httpd) fails to handle a HTTP GET requestover a given default TCP port 80. Resending the value \u0027new\u0027 to the \u0027isNew\u0027parameter in \u0027PingIframeRpm.htm\u0027 script to the router thru a proxy willcrash its httpd service denying the legitimate users access to the admincontrol panel management interface. To bring back the http srv and theadmin UI, a user must physically reboot the router.Tested on: Router Webserver. A security vulnerability exists in the PingIframeRpm.htm script of TP-LINK TL-WR740N. The following versions are affected: TP-LINK TL-WR740N version 4 using firmware versions 3.17.0 Build 140520, 3.16.6 Build 130529 and 3.16.4 Build 130205",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "BID",
        "id": "77725"
      },
      {
        "db": "BID",
        "id": "71255"
      },
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      }
    ],
    "trust": 2.88
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.zeroscience.mk/codes/tplink_mitmdos.txt",
        "trust": 0.1,
        "type": "poc"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-77295",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-9350",
        "trust": 3.5
      },
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210",
        "trust": 3.2
      },
      {
        "db": "EXPLOIT-DB",
        "id": "35345",
        "trust": 1.8
      },
      {
        "db": "PACKETSTORM",
        "id": "129227",
        "trust": 1.8
      },
      {
        "db": "OSVDB",
        "id": "115017",
        "trust": 1.8
      },
      {
        "db": "BID",
        "id": "71255",
        "trust": 1.6
      },
      {
        "db": "XF",
        "id": "98927",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "77725",
        "trust": 0.4
      },
      {
        "db": "CXSECURITY",
        "id": "WLB-2014110153",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      },
      {
        "db": "BID",
        "id": "77725"
      },
      {
        "db": "BID",
        "id": "71255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "id": "VAR-201412-0139",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      }
    ],
    "trust": 1.19019608
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:27:13.243000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "TL-WR740N",
        "trust": 0.8,
        "url": "http://www.tplink.com/au/products/details/?model=TL-WR740N"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-19",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://www.zeroscience.mk/en/vulnerabilities/zsl-2014-5210.php"
      },
      {
        "trust": 1.7,
        "url": "http://www.exploit-db.com/exploits/35345"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/129227/tp-link-tl-wr740n-denial-of-service.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/115017"
      },
      {
        "trust": 1.3,
        "url": "http://www.securityfocus.com/bid/71255"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98927"
      },
      {
        "trust": 1.0,
        "url": "http://xforce.iss.net/xforce/xfdb/98927"
      },
      {
        "trust": 0.9,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9350"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9350"
      },
      {
        "trust": 0.3,
        "url": "http://www.tp-link.com/en/"
      },
      {
        "trust": 0.1,
        "url": "http://cxsecurity.com/issue/wlb-2014110153"
      },
      {
        "trust": 0.1,
        "url": "http://www.exploit-db.com/exploits/35345/"
      },
      {
        "trust": 0.1,
        "url": "http://packetstormsecurity.com/files/129227"
      },
      {
        "trust": 0.1,
        "url": "http://osvdb.org/show/osvdb/115017"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-9350"
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      },
      {
        "db": "BID",
        "id": "77725"
      },
      {
        "db": "BID",
        "id": "71255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77295"
      },
      {
        "db": "BID",
        "id": "77725"
      },
      {
        "db": "BID",
        "id": "71255"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-11-22T00:00:00",
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "date": "2014-11-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "date": "2014-12-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77295"
      },
      {
        "date": "2014-12-08T00:00:00",
        "db": "BID",
        "id": "77725"
      },
      {
        "date": "2014-11-22T00:00:00",
        "db": "BID",
        "id": "71255"
      },
      {
        "date": "2014-12-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "date": "2014-11-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      },
      {
        "date": "2014-12-08T16:59:22.370000",
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-12-09T00:00:00",
        "db": "ZSL",
        "id": "ZSL-2014-5210"
      },
      {
        "date": "2014-11-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "date": "2017-09-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77295"
      },
      {
        "date": "2014-12-08T00:00:00",
        "db": "BID",
        "id": "77725"
      },
      {
        "date": "2014-11-22T00:00:00",
        "db": "BID",
        "id": "71255"
      },
      {
        "date": "2014-12-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-005843"
      },
      {
        "date": "2015-04-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      },
      {
        "date": "2024-11-21T02:20:40.760000",
        "db": "NVD",
        "id": "CVE-2014-9350"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "77725"
      },
      {
        "db": "BID",
        "id": "71255"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "TP-Link TL-WR740N \u0027PingIframeRpm.htm\u0027 Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-08509"
      },
      {
        "db": "BID",
        "id": "71255"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201411-466"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…