Vulnerabilites related to asus - asuswrt-merlin
var-201810-0743
Vulnerability from variot
An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command&class=remote&Cc='ls' URI. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2018-18319Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Asuswrt-Merlin is a firmware from ASUS that runs on its router. Merlin.PHP is one of the web-based management panel components
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0743", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ac1900", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac88u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac86u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt ac1900p", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac66u b1", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac5300", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac56u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68uf", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac87", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac2900", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3100", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68p", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3200", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt ac1900p", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac3200", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac5300", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac56u", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac66u b1", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac68p", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac68u", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac68uf", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac87", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac88u", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "asuswrt-merlin", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": "0.6.6" }, { "model": "rt-ac87", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac88u", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac2900", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac66u b1", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3100", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68uf", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac1900", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3200", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac56u", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac86u", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21490" }, { "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "db": "CNNVD", "id": "CNNVD-201810-690" }, { "db": "NVD", "id": "CVE-2018-18319" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt_ac1900p_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac3200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac5300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac56u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac66u_b1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac68p_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac68u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac68uf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac87_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac88u_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013245" } ] }, "cve": "CVE-2018-18319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-18319", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-21490", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-18319", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-18319", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-18319", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-21490", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201810-690", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21490" }, { "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "db": "CNNVD", "id": "CNNVD-201810-690" }, { "db": "NVD", "id": "CVE-2018-18319" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command\u0026class=remote\u0026Cc=\u0027ls\u0027 URI. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2018-18319Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Asuswrt-Merlin is a firmware from ASUS that runs on its router. Merlin.PHP is one of the web-based management panel components", "sources": [ { "db": "NVD", "id": "CVE-2018-18319" }, { "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "db": "CNVD", "id": "CNVD-2018-21490" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-18319", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2018-013245", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-21490", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201810-690", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21490" }, { "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "db": "CNNVD", "id": "CNNVD-201810-690" }, { "db": "NVD", "id": "CVE-2018-18319" } ] }, "id": "VAR-201810-0743", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-21490" } ], "trust": 1.1682876842857142 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21490" } ] }, "last_update_date": "2024-11-23T21:38:14.937000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://asuswrt.lostrealm.ca/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013245" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "db": "NVD", "id": "CVE-2018-18319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://github.com/qoli/merlin.php/issues/27" }, { "trust": 1.6, "url": "http://blog.51cto.com/010bjsoft/2298902" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-18319" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18319" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21490" }, { "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "db": "CNNVD", "id": "CNNVD-201810-690" }, { "db": "NVD", "id": "CVE-2018-18319" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-21490" }, { "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "db": "CNNVD", "id": "CNNVD-201810-690" }, { "db": "NVD", "id": "CVE-2018-18319" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-21490" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "date": "2018-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-690" }, { "date": "2018-10-15T06:29:00.607000", "db": "NVD", "id": "CVE-2018-18319" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-23T00:00:00", "db": "CNVD", "id": "CNVD-2018-21490" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013245" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-690" }, { "date": "2024-11-21T03:55:42.133000", "db": "NVD", "id": "CVE-2018-18319" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-690" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asuswrt-Merlin For devices Merlin.PHP Component input vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013245" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-690" } ], "trust": 0.6 } }
var-201810-0744
Vulnerability from variot
An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because exec.php has a popen call. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2018-18320Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Asuswrt-Merlin is a firmware from ASUS that runs on its router. Merlin.PHP is one of the web-based management panel components
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0744", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ac1900", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac88u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac86u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt ac1900p", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac66u b1", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac5300", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac56u", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68uf", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac87", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac2900", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3100", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68p", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3200", "scope": "lte", "trust": 1.0, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt ac1900p", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac3200", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac5300", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac56u", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac66u b1", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac68p", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac68u", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac68uf", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac87", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "rt-ac88u", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "asuswrt-merlin", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": "0.6.6" }, { "model": "rt-ac87", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac88u", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac2900", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac66u b1", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3100", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac68uf", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac1900", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac3200", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac56u", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" }, { "model": "rt-ac86u", "scope": "eq", "trust": 0.6, "vendor": "asuswrt merlin", "version": "380.70" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21177" }, { "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "db": "CNNVD", "id": "CNNVD-201810-691" }, { "db": "NVD", "id": "CVE-2018-18320" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt_ac1900p_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac3200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac5300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac56u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac66u_b1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac68p_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac68u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac68uf_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac87_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:rt-ac88u_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013246" } ] }, "cve": "CVE-2018-18320", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-18320", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-21177", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-18320", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-18320", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-18320", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-21177", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201810-691", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21177" }, { "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "db": "CNNVD", "id": "CNNVD-201810-691" }, { "db": "NVD", "id": "CVE-2018-18320" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because exec.php has a popen call. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2018-18320Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Asuswrt-Merlin is a firmware from ASUS that runs on its router. Merlin.PHP is one of the web-based management panel components", "sources": [ { "db": "NVD", "id": "CVE-2018-18320" }, { "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "db": "CNVD", "id": "CNVD-2018-21177" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-18320", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2018-013246", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-21177", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201810-691", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21177" }, { "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "db": "CNNVD", "id": "CNNVD-201810-691" }, { "db": "NVD", "id": "CVE-2018-18320" } ] }, "id": "VAR-201810-0744", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-21177" } ], "trust": 1.1682876842857142 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21177" } ] }, "last_update_date": "2024-11-23T23:04:57.111000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://asuswrt.lostrealm.ca/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013246" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "db": "NVD", "id": "CVE-2018-18320" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://github.com/qoli/merlin.php/issues/26" }, { "trust": 2.2, "url": "http://blog.51cto.com/010bjsoft/2298828" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18320" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-18320" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-21177" }, { "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "db": "CNNVD", "id": "CNNVD-201810-691" }, { "db": "NVD", "id": "CVE-2018-18320" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-21177" }, { "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "db": "CNNVD", "id": "CNNVD-201810-691" }, { "db": "NVD", "id": "CVE-2018-18320" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-17T00:00:00", "db": "CNVD", "id": "CNVD-2018-21177" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "date": "2018-10-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-691" }, { "date": "2018-10-15T06:29:00.763000", "db": "NVD", "id": "CVE-2018-18320" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-21177" }, { "date": "2019-02-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013246" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-691" }, { "date": "2024-11-21T03:55:42.310000", "db": "NVD", "id": "CVE-2018-18320" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-691" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asuswrt-Merlin For devices Merlin.PHP Component input vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013246" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-691" } ], "trust": 0.6 } }
var-201911-1650
Vulnerability from variot
Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id. Asuswrt-Merlin The firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS Asuswrt-Merlin is a firmware that runs in its router
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1650", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ac66u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.382.50470" }, { "model": "rt-ac66u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "asuswrt-merlin", "scope": null, "trust": 0.6, "vendor": "asus", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02713" }, { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "NVD", "id": "CVE-2018-8879" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:asus:rt-ac66u_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016158" } ] }, "cve": "CVE-2018-8879", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-8879", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-02713", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-8879", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-8879", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-8879", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-8879", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-02713", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201911-1254", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02713" }, { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "CNNVD", "id": "CNNVD-201911-1254" }, { "db": "NVD", "id": "CVE-2018-8879" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id. Asuswrt-Merlin The firmware contains a vulnerability related to out-of-bounds writing.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS Asuswrt-Merlin is a firmware that runs in its router", "sources": [ { "db": "NVD", "id": "CVE-2018-8879" }, { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "CNVD", "id": "CNVD-2020-02713" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-8879", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2018-016158", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-02713", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-1254", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02713" }, { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "CNNVD", "id": "CNNVD-201911-1254" }, { "db": "NVD", "id": "CVE-2018-8879" } ] }, "id": "VAR-201911-1650", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-02713" } ], "trust": 1.1596695499999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02713" } ] }, "last_update_date": "2024-11-23T22:05:56.126000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RT-AC66U", "trust": 0.8, "url": "https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS" }, { "title": "Patch for ASUS Asuswrt-Merlin blocking.asp buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/197547" }, { "title": "ASUS Asuswrt-Merlin Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=104042" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02713" }, { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "CNNVD", "id": "CNNVD-201911-1254" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "NVD", "id": "CVE-2018-8879" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://pagedout.institute/download/pagedout_001_beta1.pdf" }, { "trust": 1.6, "url": "https://www.asus.com/networking/rtac66u/helpdesk_bios" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8879" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8879" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02713" }, { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "CNNVD", "id": "CNNVD-201911-1254" }, { "db": "NVD", "id": "CVE-2018-8879" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-02713" }, { "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "db": "CNNVD", "id": "CNNVD-201911-1254" }, { "db": "NVD", "id": "CVE-2018-8879" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-21T00:00:00", "db": "CNVD", "id": "CNVD-2020-02713" }, { "date": "2019-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "date": "2019-11-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1254" }, { "date": "2019-11-21T16:15:11.720000", "db": "NVD", "id": "CVE-2018-8879" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-18T00:00:00", "db": "CNVD", "id": "CNVD-2020-02713" }, { "date": "2019-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016158" }, { "date": "2020-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1254" }, { "date": "2024-11-21T04:14:30.903000", "db": "NVD", "id": "CVE-2018-8879" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1254" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Asuswrt-Merlin Firmware out-of-bounds vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016158" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1254" } ], "trust": 0.6 } }
var-201909-1387
Vulnerability from variot
An issue was discovered in ASUSWRT 3.0.0.4.384.20308. There is a stack-based buffer overflow issue in parse_req_queries function in wanduck.c via a long string over UDP, which may lead to an information leak. ASUSWRT Contains a classic buffer overflow vulnerability.Information may be obtained. ASUS Asuswrt-Merlin is a firmware that runs in its router from Taiwan's ASUS Corporation (ASUS).
ASUS Asuswrt-Merlin 3.0.0.4.384.20308 version of the wanduck.c file ‘parse_req_queries’ function has a buffer overflow vulnerability. The vulnerability stems from the fact that when a network system or product performs an operation on memory, the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-1387", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asuswrt-merlin", "scope": "eq", "trust": 2.2, "vendor": "asus", "version": "3.0.0.4.384.20308" }, { "model": "asuswrt-merlin", "scope": "eq", "trust": 0.8, "vendor": "asuswrt merlin", "version": "3.0.0.4.384.20308" }, { "model": "rt-ac68u", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "CNNVD", "id": "CNNVD-201909-804" }, { "db": "NVD", "id": "CVE-2018-20336" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:asuswrt-merlin_project:asuswrt-merlin", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016073" } ] }, "cve": "CVE-2018-20336", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-20336", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-19212", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-131132", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-20336", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-20336", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-20336", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-20336", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-19212", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201909-804", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-131132", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-20336", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "VULHUB", "id": "VHN-131132" }, { "db": "VULMON", "id": "CVE-2018-20336" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "CNNVD", "id": "CNNVD-201909-804" }, { "db": "NVD", "id": "CVE-2018-20336" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. There is a stack-based buffer overflow issue in parse_req_queries function in wanduck.c via a long string over UDP, which may lead to an information leak. ASUSWRT Contains a classic buffer overflow vulnerability.Information may be obtained. ASUS Asuswrt-Merlin is a firmware that runs in its router from Taiwan\u0027s ASUS Corporation (ASUS). \n\r\n\r\nASUS Asuswrt-Merlin 3.0.0.4.384.20308 version of the wanduck.c file \u2018parse_req_queries\u2019 function has a buffer overflow vulnerability. The vulnerability stems from the fact that when a network system or product performs an operation on memory, the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attackers can use this vulnerability to cause buffer overflow or heap overflow", "sources": [ { "db": "NVD", "id": "CVE-2018-20336" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "VULHUB", "id": "VHN-131132" }, { "db": "VULMON", "id": "CVE-2018-20336" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-20336", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2018-016073", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201909-804", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2020-19212", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-131132", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-20336", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "VULHUB", "id": "VHN-131132" }, { "db": "VULMON", "id": "CVE-2018-20336" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "CNNVD", "id": "CNNVD-201909-804" }, { "db": "NVD", "id": "CVE-2018-20336" } ] }, "id": "VAR-201909-1387", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "VULHUB", "id": "VHN-131132" } ], "trust": 1.28278895 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-19212" } ] }, "last_update_date": "2024-11-23T22:51:39.243000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.asuswrt-merlin.net/" }, { "title": "Patch for ASUS Asuswrt-Merlin buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/210721" }, { "title": "ASUS Asuswrt-Merlin Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98337" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "CNNVD", "id": "CNNVD-201909-804" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-131132" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "NVD", "id": "CVE-2018-20336" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.asus.com/networking/rt-ac1200g-plus/helpdesk_bios/" }, { "trust": 2.6, "url": "https://starlabs.sg/advisories/18-20336/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20336" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-20336" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "VULHUB", "id": "VHN-131132" }, { "db": "VULMON", "id": "CVE-2018-20336" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "CNNVD", "id": "CNNVD-201909-804" }, { "db": "NVD", "id": "CVE-2018-20336" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-19212" }, { "db": "VULHUB", "id": "VHN-131132" }, { "db": "VULMON", "id": "CVE-2018-20336" }, { "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "db": "CNNVD", "id": "CNNVD-201909-804" }, { "db": "NVD", "id": "CVE-2018-20336" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-19212" }, { "date": "2019-09-17T00:00:00", "db": "VULHUB", "id": "VHN-131132" }, { "date": "2019-09-17T00:00:00", "db": "VULMON", "id": "CVE-2018-20336" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "date": "2019-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-804" }, { "date": "2019-09-17T16:15:10.747000", "db": "NVD", "id": "CVE-2018-20336" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-25T00:00:00", "db": "CNVD", "id": "CNVD-2020-19212" }, { "date": "2019-09-19T00:00:00", "db": "VULHUB", "id": "VHN-131132" }, { "date": "2019-09-19T00:00:00", "db": "VULMON", "id": "CVE-2018-20336" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-016073" }, { "date": "2019-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-804" }, { "date": "2024-11-21T04:01:15.807000", "db": "NVD", "id": "CVE-2018-20336" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-804" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUSWRT Vulnerable to classic buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-016073" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-804" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
asus | asuswrt-merlin | 3.0.0.4.384.20308 | |
asus | rt-ac68u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:asuswrt-merlin:3.0.0.4.384.20308:*:*:*:*:*:*:*", "matchCriteriaId": "C6F5108F-1393-4147-B081-09CDB16D81A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. There is a stack-based buffer overflow issue in parse_req_queries function in wanduck.c via a long string over UDP, which may lead to an information leak." }, { "lang": "es", "value": "Se detect\u00f3 un problema en ASUSWRT versi\u00f3n 3.0.0.4.384.20308. Se presenta un problema de desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en la funci\u00f3n parse_req_queries en el archivo wanduck.c mediante una cadena larga sobre UDP, lo que puede conllevar a una fuga de informaci\u00f3n." } ], "id": "CVE-2018-20336", "lastModified": "2024-11-21T04:01:15.807", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-17T16:15:10.747", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20336/" }, { "source": "cve@mitre.org", "url": "https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20336/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2018-20336
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://starlabs.sg/advisories/18-20336/ | x_refsource_MISC | |
https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://starlabs.sg/advisories/18-20336/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. There is a stack-based buffer overflow issue in parse_req_queries function in wanduck.c via a long string over UDP, which may lead to an information leak." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-19T21:31:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://starlabs.sg/advisories/18-20336/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. There is a stack-based buffer overflow issue in parse_req_queries function in wanduck.c via a long string over UDP, which may lead to an information leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://starlabs.sg/advisories/18-20336/", "refsource": "MISC", "url": "https://starlabs.sg/advisories/18-20336/" }, { "name": "https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/", "refsource": "CONFIRM", "url": "https://www.asus.com/Networking/RT-AC1200G-plus/HelpDesk_BIOS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20336", "datePublished": "2019-09-17T15:51:33", "dateReserved": "2018-12-21T00:00:00", "dateUpdated": "2024-08-05T11:58:18.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }