CVE-2014-7249

CVSS V2 High 10 CVSS V3 None
Description
Buffer overflow on the Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT-8748XL, AT-8848, AT-9816GB, AT-9924T, AT-9924Ts, CentreCOM AR415S, CentreCOM AR450S, CentreCOM AR550S, CentreCOM AR570S, CentreCOM 8700SL, CentreCOM 8948XL, CentreCOM 9924SP, CentreCOM 9924T/4SP, Rapier 48i, and SwitchBlade4000 with firmware before 2.9.1-21 allows remote attackers to execute arbitrary code via a crafted HTTP POST request.
Overview
  • CVE ID
  • CVE-2014-7249
  • Assigner
  • vultures@jpcert.or.jp
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2014-12-19T11:59:01
  • Last Modified Date
  • 2014-12-19T17:13:09
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:alliedtelesis:centrecom_ar415s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_ar415s:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-8624t\/2m_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-8624t\/2m:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:ar442s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:ar442s:-:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-9924t_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-9924t:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-8848_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-8848:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:rapier_48i_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:rapier_48i:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:centrecom_ar450s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_ar450s:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:ar745_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:ar745:-:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:ar441s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:ar441s:-:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:centrecom_9924sp_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_9924sp:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:switchblade4000_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:switchblade4000:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-8624poe_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-8624poe:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:centrecom_9924t\/4sp_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_9924t\/4sp:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-9816gb_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-9816gb:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-9924ts_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-9924ts:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:ar750s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:ar750s:-:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:centrecom_ar570s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_ar570s:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:centrecom_8948xl_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_8948xl:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-8648t\/2sp_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-8648t\/2sp:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:centrecom_8700sl_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_ar8700sl:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:ar750s-dp_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:ar750s-dp:-:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:centrecom_ar550s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:centrecom_ar550s:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:at-8748xl_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:at-8748xl:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:alliedtelesis:ar440s_firmware:*:*:*:*:*:*:*:* 1 OR 2.9.1-20
cpe:2.3:h:alliedtelesis:ar440s:-:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
History
Created Old Value New Value Data Type Notes
2022-05-10 10:25:22 Added to TrackCVE
2022-12-02 02:47:16 2014-12-19T11:59Z 2014-12-19T11:59:01 CVE Published Date updated
2022-12-02 02:47:16 2014-12-19T17:13:09 CVE Modified Date updated
2022-12-02 02:47:16 Analyzed Vulnerability Status updated