ID

VAR-201412-0586


CVE

CVE-2014-7249


TITLE

Multiple Allied Telesis products vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2014-000132

DESCRIPTION

Buffer overflow on the Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT-8748XL, AT-8848, AT-9816GB, AT-9924T, AT-9924Ts, CentreCOM AR415S, CentreCOM AR450S, CentreCOM AR550S, CentreCOM AR570S, CentreCOM 8700SL, CentreCOM 8948XL, CentreCOM 9924SP, CentreCOM 9924T/4SP, Rapier 48i, and SwitchBlade4000 with firmware before 2.9.1-21 allows remote attackers to execute arbitrary code via a crafted HTTP POST request. Allied Telesis AT-RG634A ADSL Broadband Router is an ADSL broadband router product from Allied Telesis. A buffer overflow vulnerability exists in multiple Allied Telesis products that use firmware version 2.9.1-21. Failed exploit attempts may result in a denial-of-service condition. The following products and versions are affected: Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT- 8748XL , AT-8848 , AT-9816GB , AT-9924T , AT-9924Ts , CentreCOM AR415S , CentreCOM AR450S , CentreCOM AR550S , CentreCOM AR570S , CentreCOM 8700SL , CentreCOM 8948XL , CentreCOM 9924SP , CentreCOM 9924T/4SP , Rapier 48i , SwitchBlade4000

Trust: 2.52

sources: NVD: CVE-2014-7249 // JVNDB: JVNDB-2014-000132 // CNVD: CNVD-2014-09058 // BID: 72382 // VULHUB: VHN-75194

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-09058

AFFECTED PRODUCTS

vendor:alliedtelesismodel:ar750s-dpscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar570sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-9924tscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar750sscope:eqversion: -

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar450sscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:switchblade4000scope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar442sscope:eqversion: -

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar8700slscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:at-9924tsscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar441sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar440sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar750s-dpscope:eqversion: -

Trust: 1.0

vendor:alliedtelesismodel:at-8648t\/2spscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:at-8848scope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:at-8624poescope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar450sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar550sscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom 9924spscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom 9924t\/4spscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar745scope:eqversion: -

Trust: 1.0

vendor:alliedtelesismodel:centrecom 8700slscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-8648t\/2spscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar440sscope:eqversion: -

Trust: 1.0

vendor:alliedtelesismodel:ar745scope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:ar441sscope:eqversion: -

Trust: 1.0

vendor:alliedtelesismodel:at-9924tsscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar415sscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar415sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-9816gbscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:at-8624poescope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom 9924t\/4spscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:at-8624t\/2mscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:rapier 48iscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-9924tscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom 8948xlscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:rapier 48iscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar570sscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:ar442sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:centrecom 8948xlscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-8848scope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:centrecom 9924spscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-8748xlscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:ar750sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-8748xlscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:at-8624t\/2mscope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:at-9816gbscope:lteversion:2.9.1-20

Trust: 1.0

vendor:alliedtelesismodel:switchblade4000scope:eqversion:*

Trust: 1.0

vendor:alliedtelesismodel:centrecom ar550sscope:lteversion:2.9.1-20

Trust: 1.0

vendor:allied telesismodel:ar440sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:ar441sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:ar442sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:ar745scope: - version: -

Trust: 0.8

vendor:allied telesismodel:ar750sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:ar750s-dpscope: - version: -

Trust: 0.8

vendor:allied telesismodel:at-8624poescope: - version: -

Trust: 0.8

vendor:allied telesismodel:at-8624t/2mscope: - version: -

Trust: 0.8

vendor:allied telesismodel:at-8648t/2spscope: - version: -

Trust: 0.8

vendor:allied telesismodel:at-8848scope: - version: -

Trust: 0.8

vendor:allied telesismodel:at-9924tscope: - version: -

Trust: 0.8

vendor:allied telesismodel:centrecom 8700slscope:eqversion:series

Trust: 0.8

vendor:allied telesismodel:centrecom 8700xlscope:eqversion:series (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom 8724slscope:eqversion:v2

Trust: 0.8

vendor:allied telesismodel:centrecom 8948xlscope:eqversion:series

Trust: 0.8

vendor:allied telesismodel:centrecom 9812tscope:eqversion:series (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom 9816gbscope:eqversion:series (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom 9924spscope:eqversion:(end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom 9924t/4spscope:eqversion:series (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom 9924tsscope:eqversion:series (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom ar300scope:eqversion:v2 (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom ar300lscope:eqversion:v2 (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom ar320scope:eqversion:(end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom ar410scope:eqversion:v2 (end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom ar415sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:centrecom ar450sscope:eqversion:(end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom ar550sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:centrecom ar560sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:centrecom ar570sscope: - version: -

Trust: 0.8

vendor:allied telesismodel:centrecom ar720scope:eqversion:(end of support)

Trust: 0.8

vendor:allied telesismodel:centrecom ar740scope:eqversion:(end of support)

Trust: 0.8

vendor:allied telesismodel:rapier 48iscope: - version: -

Trust: 0.8

vendor:allied telesismodel:switchblade4000scope: - version: -

Trust: 0.8

vendor:alliedmodel:telesis switchblade4000scope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis rapier 48iscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis centrecom 9924t/4sp 9924spscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis centrecom 8700sl seriesscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis centrecom 8948xlscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis centrecom ar570sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis centrecom ar550sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis centrecom ar450sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis centrecom ar415sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-9924tsscope: - version: -

Trust: 0.6

vendor:alliedmodel:telesis at-9924tscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-9816gbscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-8848scope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-8748xlscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-8648t/2spscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-8624t/2mscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-8624poescope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis ar750s-dpscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis ar750sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis ar745scope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis ar442sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis ar441sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis ar440sscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-rg634a adsl broadband routescope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-mcf2000mscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-tftpscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedmodel:telesis at-tftp serverscope:lteversion:<=2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:switchblade4000scope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:at-9924tsscope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:centrecom 9924spscope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:centrecom 9924t\/4spscope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:at-9816gbscope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:centrecom ar570sscope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:ar745scope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:ar441sscope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:ar750sscope:eqversion:2.9.1-20

Trust: 0.6

vendor:alliedtelesismodel:at-8624poescope:eqversion:2.9.1-20

Trust: 0.6

sources: CNVD: CNVD-2014-09058 // JVNDB: JVNDB-2014-000132 // CNNVD: CNNVD-201412-426 // NVD: CVE-2014-7249

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-7249
value: HIGH

Trust: 1.0

IPA: JVNDB-2014-000132
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-09058
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201412-426
value: CRITICAL

Trust: 0.6

VULHUB: VHN-75194
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-7249
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2014-000132
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2014-09058
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-75194
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-09058 // VULHUB: VHN-75194 // JVNDB: JVNDB-2014-000132 // CNNVD: CNNVD-201412-426 // NVD: CVE-2014-7249

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-75194 // JVNDB: JVNDB-2014-000132 // NVD: CVE-2014-7249

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201412-426

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201412-426

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-000132

PATCH

title:Allied Telesis Group websiteurl:http://www.allied-telesis.co.jp/support/list/faq/vuls/20141111a.html

Trust: 0.8

title:Patch for multiple Allied Telesis product buffer overflow vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/53080

Trust: 0.6

sources: CNVD: CNVD-2014-09058 // JVNDB: JVNDB-2014-000132

EXTERNAL IDS

db:NVDid:CVE-2014-7249

Trust: 3.4

db:JVNDBid:JVNDB-2014-000132

Trust: 3.1

db:JVNid:JVN22440986

Trust: 2.5

db:BIDid:72382

Trust: 1.0

db:CNVDid:CNVD-2014-09058

Trust: 0.6

db:CNNVDid:CNNVD-201412-426

Trust: 0.6

db:VULHUBid:VHN-75194

Trust: 0.1

sources: CNVD: CNVD-2014-09058 // VULHUB: VHN-75194 // BID: 72382 // JVNDB: JVNDB-2014-000132 // CNNVD: CNNVD-201412-426 // NVD: CVE-2014-7249

REFERENCES

url:http://jvn.jp/en/jp/jvn22440986/index.html

Trust: 2.5

url:http://www.allied-telesis.co.jp/support/list/faq/vuls/20141111aen.html

Trust: 1.7

url:http://jvndb.jvn.jp/jvndb/jvndb-2014-000132

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7249

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20141218-jvn.html

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7249

Trust: 0.8

url:http://jvndb.jvn.jp/en/contents/2014/jvndb-2014-000132.html

Trust: 0.6

sources: CNVD: CNVD-2014-09058 // VULHUB: VHN-75194 // JVNDB: JVNDB-2014-000132 // CNNVD: CNNVD-201412-426 // NVD: CVE-2014-7249

CREDITS

Allied Telesis

Trust: 0.3

sources: BID: 72382

SOURCES

db:CNVDid:CNVD-2014-09058
db:VULHUBid:VHN-75194
db:BIDid:72382
db:JVNDBid:JVNDB-2014-000132
db:CNNVDid:CNNVD-201412-426
db:NVDid:CVE-2014-7249

LAST UPDATE DATE

2025-04-13T23:34:06+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-09058date:2014-12-23T00:00:00
db:VULHUBid:VHN-75194date:2014-12-19T00:00:00
db:BIDid:72382date:2015-01-30T00:00:00
db:JVNDBid:JVNDB-2014-000132date:2015-01-28T00:00:00
db:CNNVDid:CNNVD-201412-426date:2014-12-26T00:00:00
db:NVDid:CVE-2014-7249date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-09058date:2014-12-23T00:00:00
db:VULHUBid:VHN-75194date:2014-12-19T00:00:00
db:BIDid:72382date:2015-01-30T00:00:00
db:JVNDBid:JVNDB-2014-000132date:2014-12-18T00:00:00
db:CNNVDid:CNNVD-201412-426date:2014-12-22T00:00:00
db:NVDid:CVE-2014-7249date:2014-12-19T11:59:01.400