### [CVE-2014-8361](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8361) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. ### POC #### Reference - http://packetstormsecurity.com/files/132090/Realtek-SDK-Miniigd-UPnP-SOAP-Command-Execution.html - https://www.exploit-db.com/exploits/37169/ #### Github - https://github.com/MiracleAnameke/Cybersecurity-Vulnerability-and-Exposure-Report - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/oxMdee/Cybersecurity-Vulnerability-and-Exposure-Report - https://github.com/xuguowong/Mirai-MAL