Vulnerabilites related to asus - rt-n10e
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.kb.cert.org/vuls/id/984366 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/984366 | US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-n10e_firmware | * | |
asus | rt-n10e_firmware | 2.0.0.7 | |
asus | rt-n10e_firmware | 2.0.0.10 | |
asus | rt-n10e_firmware | 2.0.0.16 | |
asus | rt-n10e_firmware | 2.0.0.19 | |
asus | rt-n10e_firmware | 2.0.0.20 | |
asus | rt-n10e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5653E47A-FE04-45F5-9218-021C10B7FD45", "versionEndIncluding": "2.0.0.24", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB012B3-5C57-4310-8F1A-208D2E470A6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "8F1D15BC-D83F-4949-863B-817FA2A0A23D", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "0ACDCE11-5422-4AB1-AC89-3C3DF05FDE1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7607C5-EF0C-40FA-BADA-2316BA4A5E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "340D98A2-2018-4A24-B654-3A7032FCE518", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFCC588-AAA6-45FA-8D1F-E57C7693D27A", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "qis/QIS_finish.htm on the ASUS RT-N10E router with firmware before 2.0.0.25 does not require authentication, which allows remote attackers to discover the administrator password via a direct request." }, { "lang": "es", "value": "qis/QIS_finish.htm en el router ASUS RT-N10E con firmware anterior a la versi\u00f3n 2.0.0.25 no requiere autenticaci\u00f3n, lo que permite a atacantes remotos descubrir la contrase\u00f1a de administrador a trav\u00e9s de una petici\u00f3n directa." } ], "id": "CVE-2013-3610", "lastModified": "2024-11-21T01:53:59.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-10-05T10:55:03.493", "references": [ { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/984366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/984366" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://starlabs.sg/advisories/18-20334/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://starlabs.sg/advisories/18-20334/ | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | asuswrt | 3.0.0.4.384.20308 | |
asus | gt-ac2900 | - | |
asus | gt-ac5300 | - | |
asus | gt-ax11000 | - | |
asus | rt-ac1200 | - | |
asus | rt-ac1200_v2 | - | |
asus | rt-ac1200g | - | |
asus | rt-ac1200ge | - | |
asus | rt-ac1750 | - | |
asus | rt-ac1750_b1 | - | |
asus | rt-ac1900p | - | |
asus | rt-ac3100 | - | |
asus | rt-ac3200 | - | |
asus | rt-ac51u | - | |
asus | rt-ac5300 | - | |
asus | rt-ac55u | - | |
asus | rt-ac56r | - | |
asus | rt-ac56s | - | |
asus | rt-ac56u | - | |
asus | rt-ac66r | - | |
asus | rt-ac66u | - | |
asus | rt-ac66u-b1 | - | |
asus | rt-ac66u_b1 | - | |
asus | rt-ac68p | - | |
asus | rt-ac68u | - | |
asus | rt-ac86u | - | |
asus | rt-ac87u | - | |
asus | rt-ac88u | - | |
asus | rt-acrh12 | - | |
asus | rt-acrh13 | - | |
asus | rt-ax3000 | - | |
asus | rt-ax56u | - | |
asus | rt-ax58u | - | |
asus | rt-ax88u | - | |
asus | rt-ax92u | - | |
asus | rt-g32 | - | |
asus | rt-n10\+d1 | - | |
asus | rt-n10e | - | |
asus | rt-n14u | - | |
asus | rt-n16 | - | |
asus | rt-n19 | - | |
asus | rt-n56r | - | |
asus | rt-n56u | - | |
asus | rt-n600 | - | |
asus | rt-n65u | - | |
asus | rt-n66r | - | |
asus | rt-n66u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:asuswrt:3.0.0.4.384.20308:*:*:*:*:*:*:*", "matchCriteriaId": "4F4DB439-E9CC-4BA5-9A05-B51BF8DCD038", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B581C286-7C47-42BF-8876-243285409374", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:gt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D2B9867-7DA3-4221-9148-36FD412FA993", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC02F598-C10E-4C77-9BE9-CB3660893C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BE19DF1-EB89-4CE5-956F-79BD4AD5E52F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BBA2CB-3DD3-4A8F-9556-E845AFAB2043", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF74439-AD6D-4BBB-9254-640170FE1CF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2078161F-17EB-45EE-BCE9-C86B3860FD5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*", "matchCriteriaId": "59001E8D-E835-464A-915A-AAF59F2F397F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FC355D-5C81-4041-B649-EB271CA55AFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E5EEF4-D19B-41D1-86B6-F2CBB745570E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B17C2B-A1EC-4FC1-8AB1-F35D9E3A0AA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFE8A3B1-284B-40EC-872E-B8F7103F108C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:*", "matchCriteriaId": "24748D40-7F43-44DA-BBEF-46D85D2AADA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EE62D6-1E29-4E84-8944-D3D68E212140", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7DF43D-7EEE-405C-BB2B-822936BCB4A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32874C8-05B6-44A1-B118-DC2F4FE62134", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*", "matchCriteriaId": "63A1E548-F12D-4BF7-9C01-1325A725FF91", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E87BA7-FACD-46B2-BE2A-9EFEA3C62C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D59C40A-D9BA-455B-9F9E-D3B6FB80BC13", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u-b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD103F76-C432-4577-8465-831E0314D8D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6B0EC4-797D-4059-AA90-EC09A49FE105", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5713F0F3-B616-42B7-A0D8-7983F00E79FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*", "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81008E66-B5E8-4DE5-B14D-E6983C69BC29", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-acrh12:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EF9FF00-2DDC-4900-8A93-A51E41EA5C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:*", "matchCriteriaId": "41AF79B6-D208-4357-A08D-D1AB6F136F59", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EB70155-390A-472E-A0AA-59A18ADD2BF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-g32:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AD16BBF-DB02-4E96-A310-82C13898B29D", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n10\\+d1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8794D4A-5E8C-432D-A2FB-9CF86158E8D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFCC588-AAA6-45FA-8D1F-E57C7693D27A", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85B0C29C-29A5-4659-8D76-9241B13682DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E016FE0-0A28-49AA-A213-38A5F7728FE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:*", "matchCriteriaId": "507A5D4D-CAF9-4417-9EA6-B499E04D1CDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n56r:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C092D3-14B2-4DBB-8C20-D15F0BA33FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n600:-:*:*:*:*:*:*:*", "matchCriteriaId": "481C7F6F-23A4-4B8B-8E14-44ADFCBE8C58", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5567C97-0AE2-429B-B4D7-1CF501BD2C07", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB4466BA-09EB-43F0-9610-6574F10B5810", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell." }, { "lang": "es", "value": "Se detect\u00f3 un problema en ASUSWRT versi\u00f3n 3.0.0.4.384.20308. Al procesar los datos POST del archivo /start_apply.htm, se presenta un problema de inyecci\u00f3n de comandos por medio de metacaracteres de shell en el par\u00e1metro fb_email. Al usar este problema, un atacante puede controlar el enrutador y conseguir la shell." } ], "id": "CVE-2018-20334", "lastModified": "2024-11-21T04:01:15.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-20T01:15:22.357", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20334/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20334/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://starlabs.sg/advisories/18-20335/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://starlabs.sg/advisories/18-20335/ | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | asuswrt | 3.0.0.4.384.20308 | |
asus | gt-ac2900 | - | |
asus | gt-ac5300 | - | |
asus | gt-ax11000 | - | |
asus | rt-ac1200 | - | |
asus | rt-ac1200_v2 | - | |
asus | rt-ac1200g | - | |
asus | rt-ac1200ge | - | |
asus | rt-ac1750 | - | |
asus | rt-ac1750_b1 | - | |
asus | rt-ac1900p | - | |
asus | rt-ac3100 | - | |
asus | rt-ac3200 | - | |
asus | rt-ac51u | - | |
asus | rt-ac5300 | - | |
asus | rt-ac55u | - | |
asus | rt-ac56r | - | |
asus | rt-ac56s | - | |
asus | rt-ac56u | - | |
asus | rt-ac66r | - | |
asus | rt-ac66u | - | |
asus | rt-ac66u-b1 | - | |
asus | rt-ac66u_b1 | - | |
asus | rt-ac68p | - | |
asus | rt-ac68u | - | |
asus | rt-ac86u | - | |
asus | rt-ac87u | - | |
asus | rt-ac88u | - | |
asus | rt-acrh12 | - | |
asus | rt-acrh13 | - | |
asus | rt-ax3000 | - | |
asus | rt-ax56u | - | |
asus | rt-ax58u | - | |
asus | rt-ax88u | - | |
asus | rt-ax92u | - | |
asus | rt-g32 | - | |
asus | rt-n10\+d1 | - | |
asus | rt-n10e | - | |
asus | rt-n14u | - | |
asus | rt-n16 | - | |
asus | rt-n19 | - | |
asus | rt-n56r | - | |
asus | rt-n56u | - | |
asus | rt-n600 | - | |
asus | rt-n65u | - | |
asus | rt-n66r | - | |
asus | rt-n66u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:asuswrt:3.0.0.4.384.20308:*:*:*:*:*:*:*", "matchCriteriaId": "4F4DB439-E9CC-4BA5-9A05-B51BF8DCD038", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B581C286-7C47-42BF-8876-243285409374", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:gt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D2B9867-7DA3-4221-9148-36FD412FA993", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC02F598-C10E-4C77-9BE9-CB3660893C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BE19DF1-EB89-4CE5-956F-79BD4AD5E52F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BBA2CB-3DD3-4A8F-9556-E845AFAB2043", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF74439-AD6D-4BBB-9254-640170FE1CF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2078161F-17EB-45EE-BCE9-C86B3860FD5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*", "matchCriteriaId": "59001E8D-E835-464A-915A-AAF59F2F397F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FC355D-5C81-4041-B649-EB271CA55AFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E5EEF4-D19B-41D1-86B6-F2CBB745570E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B17C2B-A1EC-4FC1-8AB1-F35D9E3A0AA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFE8A3B1-284B-40EC-872E-B8F7103F108C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:*", "matchCriteriaId": "24748D40-7F43-44DA-BBEF-46D85D2AADA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EE62D6-1E29-4E84-8944-D3D68E212140", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7DF43D-7EEE-405C-BB2B-822936BCB4A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32874C8-05B6-44A1-B118-DC2F4FE62134", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*", "matchCriteriaId": "63A1E548-F12D-4BF7-9C01-1325A725FF91", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E87BA7-FACD-46B2-BE2A-9EFEA3C62C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D59C40A-D9BA-455B-9F9E-D3B6FB80BC13", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u-b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD103F76-C432-4577-8465-831E0314D8D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6B0EC4-797D-4059-AA90-EC09A49FE105", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5713F0F3-B616-42B7-A0D8-7983F00E79FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*", "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81008E66-B5E8-4DE5-B14D-E6983C69BC29", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-acrh12:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EF9FF00-2DDC-4900-8A93-A51E41EA5C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:*", "matchCriteriaId": "41AF79B6-D208-4357-A08D-D1AB6F136F59", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EB70155-390A-472E-A0AA-59A18ADD2BF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-g32:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AD16BBF-DB02-4E96-A310-82C13898B29D", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n10\\+d1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8794D4A-5E8C-432D-A2FB-9CF86158E8D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFCC588-AAA6-45FA-8D1F-E57C7693D27A", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85B0C29C-29A5-4659-8D76-9241B13682DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E016FE0-0A28-49AA-A213-38A5F7728FE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:*", "matchCriteriaId": "507A5D4D-CAF9-4417-9EA6-B499E04D1CDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n56r:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C092D3-14B2-4DBB-8C20-D15F0BA33FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n600:-:*:*:*:*:*:*:*", "matchCriteriaId": "481C7F6F-23A4-4B8B-8E14-44ADFCBE8C58", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5567C97-0AE2-429B-B4D7-1CF501BD2C07", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB4466BA-09EB-43F0-9610-6574F10B5810", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can trigger a DoS of the httpd service via the /APP_Installation.asp?= URI." }, { "lang": "es", "value": "Se detect\u00f3 un problema en ASUSWRT versi\u00f3n 3.0.0.4.384.20308. Un usuario no autenticado puede desencadenar una DoS del servicio httpd por medio del URI /APP_Installation.asp?=." } ], "id": "CVE-2018-20335", "lastModified": "2024-11-21T04:01:15.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-20T01:15:22.453", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20335/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20335/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://starlabs.sg/advisories/18-20333/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://starlabs.sg/advisories/18-20333/ | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | asuswrt | 3.0.0.4.384.20308 | |
asus | gt-ac2900 | - | |
asus | gt-ac5300 | - | |
asus | gt-ax11000 | - | |
asus | rt-ac1200 | - | |
asus | rt-ac1200_v2 | - | |
asus | rt-ac1200g | - | |
asus | rt-ac1200ge | - | |
asus | rt-ac1750 | - | |
asus | rt-ac1750_b1 | - | |
asus | rt-ac1900p | - | |
asus | rt-ac3100 | - | |
asus | rt-ac3200 | - | |
asus | rt-ac51u | - | |
asus | rt-ac5300 | - | |
asus | rt-ac55u | - | |
asus | rt-ac56r | - | |
asus | rt-ac56s | - | |
asus | rt-ac56u | - | |
asus | rt-ac66r | - | |
asus | rt-ac66u | - | |
asus | rt-ac66u-b1 | - | |
asus | rt-ac66u_b1 | - | |
asus | rt-ac68p | - | |
asus | rt-ac68u | - | |
asus | rt-ac86u | - | |
asus | rt-ac87u | - | |
asus | rt-ac88u | - | |
asus | rt-acrh12 | - | |
asus | rt-acrh13 | - | |
asus | rt-ax3000 | - | |
asus | rt-ax56u | - | |
asus | rt-ax58u | - | |
asus | rt-ax88u | - | |
asus | rt-ax92u | - | |
asus | rt-g32 | - | |
asus | rt-n10\+d1 | - | |
asus | rt-n10e | - | |
asus | rt-n14u | - | |
asus | rt-n16 | - | |
asus | rt-n19 | - | |
asus | rt-n56r | - | |
asus | rt-n56u | - | |
asus | rt-n600 | - | |
asus | rt-n65u | - | |
asus | rt-n66r | - | |
asus | rt-n66u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:asuswrt:3.0.0.4.384.20308:*:*:*:*:*:*:*", "matchCriteriaId": "4F4DB439-E9CC-4BA5-9A05-B51BF8DCD038", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B581C286-7C47-42BF-8876-243285409374", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:gt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D2B9867-7DA3-4221-9148-36FD412FA993", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC02F598-C10E-4C77-9BE9-CB3660893C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BE19DF1-EB89-4CE5-956F-79BD4AD5E52F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BBA2CB-3DD3-4A8F-9556-E845AFAB2043", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF74439-AD6D-4BBB-9254-640170FE1CF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2078161F-17EB-45EE-BCE9-C86B3860FD5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*", "matchCriteriaId": "59001E8D-E835-464A-915A-AAF59F2F397F", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FC355D-5C81-4041-B649-EB271CA55AFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E5EEF4-D19B-41D1-86B6-F2CBB745570E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B17C2B-A1EC-4FC1-8AB1-F35D9E3A0AA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFE8A3B1-284B-40EC-872E-B8F7103F108C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:*", "matchCriteriaId": "24748D40-7F43-44DA-BBEF-46D85D2AADA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EE62D6-1E29-4E84-8944-D3D68E212140", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7DF43D-7EEE-405C-BB2B-822936BCB4A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32874C8-05B6-44A1-B118-DC2F4FE62134", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*", "matchCriteriaId": "63A1E548-F12D-4BF7-9C01-1325A725FF91", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E87BA7-FACD-46B2-BE2A-9EFEA3C62C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D59C40A-D9BA-455B-9F9E-D3B6FB80BC13", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u-b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD103F76-C432-4577-8465-831E0314D8D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6B0EC4-797D-4059-AA90-EC09A49FE105", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5713F0F3-B616-42B7-A0D8-7983F00E79FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*", "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81008E66-B5E8-4DE5-B14D-E6983C69BC29", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-acrh12:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EF9FF00-2DDC-4900-8A93-A51E41EA5C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:*", "matchCriteriaId": "41AF79B6-D208-4357-A08D-D1AB6F136F59", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EB70155-390A-472E-A0AA-59A18ADD2BF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-g32:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AD16BBF-DB02-4E96-A310-82C13898B29D", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n10\\+d1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8794D4A-5E8C-432D-A2FB-9CF86158E8D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFCC588-AAA6-45FA-8D1F-E57C7693D27A", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85B0C29C-29A5-4659-8D76-9241B13682DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E016FE0-0A28-49AA-A213-38A5F7728FE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:*", "matchCriteriaId": "507A5D4D-CAF9-4417-9EA6-B499E04D1CDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n56r:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C092D3-14B2-4DBB-8C20-D15F0BA33FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n600:-:*:*:*:*:*:*:*", "matchCriteriaId": "481C7F6F-23A4-4B8B-8E14-44ADFCBE8C58", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5567C97-0AE2-429B-B4D7-1CF501BD2C07", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB4466BA-09EB-43F0-9610-6574F10B5810", "vulnerable": false }, { "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can request /update_applist.asp to see if a USB device is attached to the router and if there are apps installed on the router." }, { "lang": "es", "value": "Se detect\u00f3 un problema en ASUSWRT versi\u00f3n 3.0.0.4.384.20308. Un usuario no autenticado puede solicitar el archivo /update_applist.asp para visualizar si un dispositivo USB se encuentra adjunto al enrutador y si hay aplicaciones instaladas en el enrutador." } ], "id": "CVE-2018-20333", "lastModified": "2024-11-21T04:01:15.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-20T01:15:22.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20333/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://starlabs.sg/advisories/18-20333/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201310-0217
Vulnerability from variot
qis/QIS_finish.htm on the ASUS RT-N10E router with firmware before 2.0.0.25 does not require authentication, which allows remote attackers to discover the administrator password via a direct request. ASUS Wireless-N150 Router RT-N10E No authentication bypass (CWE-592) Vulnerabilities exist. CWE-592: Authentication Bypass Issues http://cwe.mitre.org/data/definitions/592.htmlAdministrator authentication information may be obtained by a third party who can access the product. As a result, arbitrary operations may be executed with administrator privileges for the product. Successful exploits will allow unauthenticated attackers to obtain sensitive information of the device such as administrative password, which may aid in further attacks. ASUS RT-N10E firmware version 2.0.0.24 is vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0217", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-n10e", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "2.0.0.19" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "2.0.0.20" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "2.0.0.16" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "2.0.0.7" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "2.0.0.10" }, { "model": "rt-n10e", "scope": "lte", "trust": 1.0, "vendor": "asus", "version": "2.0.0.24" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-n10e", "scope": "lte", "trust": 0.8, "vendor": "asustek computer", "version": "version 2.0.0.24" }, { "model": "rt-n10e wireless router", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": "2.0.0.24" }, { "model": "rt-n10e", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": "2.0.0.24" } ], "sources": [ { "db": "CERT/CC", "id": "VU#984366" }, { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "db": "CNNVD", "id": "CNNVD-201310-021" }, { "db": "NVD", "id": "CVE-2013-3610" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:asus:rt-n10e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004505" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sanket Karalkar", "sources": [ { "db": "BID", "id": "62850" } ], "trust": 0.3 }, "cve": "CVE-2013-3610", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CVE-2013-3610", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "availabilityRequirement": "NOT DEFINED", "baseScore": 5.6, "collateralDamagePotential": "NOT DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 1.2, "exploitability": "FUNCTIONAL", "exploitabilityScore": 3.9, "id": "CVE-2013-3610", "impactScore": 7.8, "integrityImpact": "PARTIAL", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "MEDIUM", "targetDistribution": "LOW", "trust": 0.8, "userInteractionRequired": null, "vector_string": "AV:L/AC:L/Au:N/C:C/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2013-13507", "impactScore": 7.8, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-63612", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-3610", "trust": 1.6, "value": "MEDIUM" }, { "author": "nvd@nist.gov", "id": "CVE-2013-3610", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2013-13507", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201310-021", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-63612", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#984366" }, { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "VULHUB", "id": "VHN-63612" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "db": "CNNVD", "id": "CNNVD-201310-021" }, { "db": "NVD", "id": "CVE-2013-3610" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "qis/QIS_finish.htm on the ASUS RT-N10E router with firmware before 2.0.0.25 does not require authentication, which allows remote attackers to discover the administrator password via a direct request. ASUS Wireless-N150 Router RT-N10E No authentication bypass (CWE-592) Vulnerabilities exist. CWE-592: Authentication Bypass Issues http://cwe.mitre.org/data/definitions/592.htmlAdministrator authentication information may be obtained by a third party who can access the product. As a result, arbitrary operations may be executed with administrator privileges for the product. \nSuccessful exploits will allow unauthenticated attackers to obtain sensitive information of the device such as administrative password, which may aid in further attacks. \nASUS RT-N10E firmware version 2.0.0.24 is vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2013-3610" }, { "db": "CERT/CC", "id": "VU#984366" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "BID", "id": "62850" }, { "db": "VULHUB", "id": "VHN-63612" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/984366", "trust": 0.8, "type": "unknown" } ], "sources": [ { "db": "CERT/CC", "id": "VU#984366" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#984366", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2013-3610", "trust": 3.4 }, { "db": "BID", "id": "62850", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU96826639", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-004505", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201310-021", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-13507", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-63612", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#984366" }, { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "VULHUB", "id": "VHN-63612" }, { "db": "BID", "id": "62850" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "db": "CNNVD", "id": "CNNVD-201310-021" }, { "db": "NVD", "id": "CVE-2013-3610" } ] }, "id": "VAR-201310-0217", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "VULHUB", "id": "VHN-63612" } ], "trust": 1.49166665 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13507" } ] }, "last_update_date": "2024-11-23T23:12:48.528000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RT-N10E - Driver \u0026 Tools", "trust": 0.8, "url": "http://www.asus.com/Networking/RTN10E/#support_Download" }, { "title": "ASUS RT-N10E Wireless Router \u0027QIS_finish.htm\u0027 Patch for Password Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/40041" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 }, { "problemtype": "CWE-592", "trust": 0.8 } ], "sources": [ { "db": "CERT/CC", "id": "VU#984366" }, { "db": "VULHUB", "id": "VHN-63612" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "db": "NVD", "id": "CVE-2013-3610" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://www.kb.cert.org/vuls/id/984366" }, { "trust": 1.1, "url": "http://www.asus.com/networking/rtn10e/" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/592.html" }, { "trust": 0.8, "url": "http://www.asus.com/networking/rtn10e/#support_download" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3610" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu96826639/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3610" }, { "trust": 0.3, "url": "http://www.asus.com/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#984366" }, { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "VULHUB", "id": "VHN-63612" }, { "db": "BID", "id": "62850" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "db": "CNNVD", "id": "CNNVD-201310-021" }, { "db": "NVD", "id": "CVE-2013-3610" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#984366" }, { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "VULHUB", "id": "VHN-63612" }, { "db": "BID", "id": "62850" }, { "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "db": "CNNVD", "id": "CNNVD-201310-021" }, { "db": "NVD", "id": "CVE-2013-3610" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-04T00:00:00", "db": "CERT/CC", "id": "VU#984366" }, { "date": "2013-10-10T00:00:00", "db": "CNVD", "id": "CNVD-2013-13507" }, { "date": "2013-10-05T00:00:00", "db": "VULHUB", "id": "VHN-63612" }, { "date": "2013-10-04T00:00:00", "db": "BID", "id": "62850" }, { "date": "2013-10-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "date": "2013-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-021" }, { "date": "2013-10-05T10:55:03.493000", "db": "NVD", "id": "CVE-2013-3610" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-04T00:00:00", "db": "CERT/CC", "id": "VU#984366" }, { "date": "2013-10-10T00:00:00", "db": "CNVD", "id": "CNVD-2013-13507" }, { "date": "2013-10-07T00:00:00", "db": "VULHUB", "id": "VHN-63612" }, { "date": "2013-10-04T00:00:00", "db": "BID", "id": "62850" }, { "date": "2013-10-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004505" }, { "date": "2013-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-021" }, { "date": "2024-11-21T01:53:59.057000", "db": "NVD", "id": "CVE-2013-3610" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-021" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS RT-N10E Wireless Router \u0027QIS_finish.htm\u0027 Password Information Disclosure Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2013-13507" }, { "db": "BID", "id": "62850" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-021" } ], "trust": 0.6 } }
var-201404-0636
Vulnerability from variot
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code. ASUS RT-Series Wireless Routers is a wireless router device. ASUS RT-Series Wireless Routers 'Advanced_System_Content.asp' has an information disclosure vulnerability that allows an attacker to exploit a vulnerability to obtain sensitive information. ASUS RT-Series running firmware versions prior to 3.0.0.4.374.5517 are vulnerable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0636", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-n56u", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "3.0.0.4.318" }, { "model": "rt-n16", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "3.0.0.4.220" }, { "model": "rt-ac68u", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "3.0.0.4.374_4887" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "1.0.1.8n" }, { "model": "rt-ac68u", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "3.0.0.4.374.4755" }, { "model": "rt-n66u", "scope": "eq", "trust": 1.6, "vendor": "asus", "version": "3.0.0.4.370" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.1.8j" }, { "model": "rt-ac66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.246" }, { "model": "rt-n65u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.3.176" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.1.9" }, { "model": "rt-n65u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.334" }, { "model": "rt-ac66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.260" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "7.0.2.38b" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "8.1.1.4" }, { "model": "rt-n65u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.342" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.360" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "2.0.0.20" }, { "model": "rt-ac68u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "7.0.1.32" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "2.0.0.16" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "2.0.0.25" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.3.162" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "2.0.0.24" }, { "model": "rt-n14u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.356" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "2.0.0.10" }, { "model": "rt-n65u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.3.134" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.1.4" }, { "model": "rt-ac66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.354" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.1.8l" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.246" }, { "model": "rt-n65u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.346" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.260" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.1.4o" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.2.3" }, { "model": "rt-n65u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.260" }, { "model": "rt-ac66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.140" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.1.7c" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.3.178" }, { "model": "rt-ac66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.220" }, { "model": "rt-ac68u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.374_4561" }, { "model": "rt-n14u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.322" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "7.0.1.21" }, { "model": "tm-ac1900", "scope": "eq", "trust": 1.0, "vendor": "t mobile", "version": "3.0.0.4.376_3169" }, { "model": "rt-ac66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.270" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.334" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.342" }, { "model": "rt-n66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.272" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "2.0.0.19" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.3.108" }, { "model": "rt-n16", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.354" }, { "model": "rt-n10e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "2.0.0.7" }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "1.0.1.7f" }, { "model": "rt-ac66u", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-ac68u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ac68u", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-n10e", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-n14u", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-n16", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-n56u", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-n65u", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-n66u", "scope": "lt", "trust": 0.8, "vendor": "asustek computer", "version": "3.0.0.4.374.5517" }, { "model": "rt-series wireless routers", "scope": "lte", "trust": 0.6, "vendor": "asus", "version": "\u003c=3.0.0.4.374.5517" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "db": "CNNVD", "id": "CNNVD-201404-434" }, { "db": "NVD", "id": "CVE-2014-2719" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:asus:rt-ac66u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:asus:rt-ac68u", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asus:rt-ac68u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asus:rt-n10e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asus:rt-n14u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asus:rt-n16_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asus:rt-n56u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asus:rt-n65u_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:asus:rt-n66u_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002210" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Longenecker", "sources": [ { "db": "BID", "id": "66954" } ], "trust": 0.3 }, "cve": "CVE-2014-2719", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "CVE-2014-2719", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-02538", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.8, "id": "VHN-70658", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:S/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-2719", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2014-2719", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2014-02538", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201404-434", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-70658", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "VULHUB", "id": "VHN-70658" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "db": "CNNVD", "id": "CNNVD-201404-434" }, { "db": "NVD", "id": "CVE-2014-2719" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code. ASUS RT-Series Wireless Routers is a wireless router device. ASUS RT-Series Wireless Routers \u0027Advanced_System_Content.asp\u0027 has an information disclosure vulnerability that allows an attacker to exploit a vulnerability to obtain sensitive information. \nASUS RT-Series running firmware versions prior to 3.0.0.4.374.5517 are vulnerable", "sources": [ { "db": "NVD", "id": "CVE-2014-2719" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "BID", "id": "66954" }, { "db": "VULHUB", "id": "VHN-70658" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-70658", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-70658" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2719", "trust": 3.1 }, { "db": "BID", "id": "66954", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2014-002210", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201404-434", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-02538", "trust": 0.6 }, { "db": "FULLDISC", "id": "20140416 ASUS RT-XXXX SOHO ROUTERS EXPOSE ADMIN PASSWORD, FIXED IN 3.0.0.4.374.5517", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "126213", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-70658", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "VULHUB", "id": "VHN-70658" }, { "db": "BID", "id": "66954" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "db": "CNNVD", "id": "CNNVD-201404-434" }, { "db": "NVD", "id": "CVE-2014-2719" } ] }, "id": "VAR-201404-0636", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "VULHUB", "id": "VHN-70658" } ], "trust": 1.3092795819999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" } ] }, "last_update_date": "2024-11-23T22:27:20.259000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RT-N66U", "trust": 0.8, "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29" }, { "title": "Cellspot router firmware update information", "trust": 0.8, "url": "https://support.t-mobile.com/docs/DOC-21994" }, { "title": "ASUS RT-Series Wireless Routers \u0027Advanced_System_Content.asp\u0027 Patch for Information Disclosure Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/45075" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70658" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "db": "NVD", "id": "CVE-2014-2719" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://seclists.org/fulldisclosure/2014/apr/225" }, { "trust": 1.7, "url": "http://support.asus.com/download.aspx?m=rt-n66u+%28ver.b1%29" }, { "trust": 1.7, "url": "http://dnlongen.blogspot.com/2014/04/cve-2014-2719-asus-rt-password-disclosure.html" }, { "trust": 1.1, "url": "https://support.t-mobile.com/docs/doc-21994" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2719" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2719" }, { "trust": 0.8, "url": "http://dnlongen.blogspot.jp/2014/04/cve-2014-2719-asus-rt-password-disclosure.html" }, { "trust": 0.3, "url": "http://www.asus.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "VULHUB", "id": "VHN-70658" }, { "db": "BID", "id": "66954" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "db": "CNNVD", "id": "CNNVD-201404-434" }, { "db": "NVD", "id": "CVE-2014-2719" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "VULHUB", "id": "VHN-70658" }, { "db": "BID", "id": "66954" }, { "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "db": "CNNVD", "id": "CNNVD-201404-434" }, { "db": "NVD", "id": "CVE-2014-2719" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-04-21T00:00:00", "db": "CNVD", "id": "CNVD-2014-02538" }, { "date": "2014-04-22T00:00:00", "db": "VULHUB", "id": "VHN-70658" }, { "date": "2014-04-14T00:00:00", "db": "BID", "id": "66954" }, { "date": "2014-04-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "date": "2014-04-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-434" }, { "date": "2014-04-22T13:06:29.493000", "db": "NVD", "id": "CVE-2014-2719" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-04-21T00:00:00", "db": "CNVD", "id": "CNVD-2014-02538" }, { "date": "2016-06-30T00:00:00", "db": "VULHUB", "id": "VHN-70658" }, { "date": "2014-04-14T00:00:00", "db": "BID", "id": "66954" }, { "date": "2016-02-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002210" }, { "date": "2014-04-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201404-434" }, { "date": "2024-11-21T02:06:49.840000", "db": "NVD", "id": "CVE-2014-2719" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201404-434" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS RT-Series Wireless Routers \u0027Advanced_System_Content.asp\u0027 Information Disclosure Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2014-02538" }, { "db": "BID", "id": "66954" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201404-434" } ], "trust": 0.6 } }
cve-2018-20333
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://starlabs.sg/advisories/18-20333/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://starlabs.sg/advisories/18-20333/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can request /update_applist.asp to see if a USB device is attached to the router and if there are apps installed on the router." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T00:11:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://starlabs.sg/advisories/18-20333/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can request /update_applist.asp to see if a USB device is attached to the router and if there are apps installed on the router." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://starlabs.sg/advisories/18-20333/", "refsource": "MISC", "url": "https://starlabs.sg/advisories/18-20333/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20333", "datePublished": "2020-03-20T00:11:15", "dateReserved": "2018-12-21T00:00:00", "dateUpdated": "2024-08-05T11:58:19.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20335
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://starlabs.sg/advisories/18-20335/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.948Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://starlabs.sg/advisories/18-20335/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can trigger a DoS of the httpd service via the /APP_Installation.asp?= URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T00:11:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://starlabs.sg/advisories/18-20335/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. An unauthenticated user can trigger a DoS of the httpd service via the /APP_Installation.asp?= URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://starlabs.sg/advisories/18-20335/", "refsource": "MISC", "url": "https://starlabs.sg/advisories/18-20335/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20335", "datePublished": "2020-03-20T00:11:09", "dateReserved": "2018-12-21T00:00:00", "dateUpdated": "2024-08-05T11:58:18.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20334
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://starlabs.sg/advisories/18-20334/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://starlabs.sg/advisories/18-20334/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T00:11:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://starlabs.sg/advisories/18-20334/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://starlabs.sg/advisories/18-20334/", "refsource": "MISC", "url": "https://starlabs.sg/advisories/18-20334/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20334", "datePublished": "2020-03-20T00:11:06", "dateReserved": "2018-12-21T00:00:00", "dateUpdated": "2024-08-05T11:58:18.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3610
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/984366 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:14:56.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#984366", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/984366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "qis/QIS_finish.htm on the ASUS RT-N10E router with firmware before 2.0.0.25 does not require authentication, which allows remote attackers to discover the administrator password via a direct request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-10-05T10:00:00Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#984366", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/984366" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2013-3610", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "qis/QIS_finish.htm on the ASUS RT-N10E router with firmware before 2.0.0.25 does not require authentication, which allows remote attackers to discover the administrator password via a direct request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#984366", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/984366" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2013-3610", "datePublished": "2013-10-05T10:00:00Z", "dateReserved": "2013-05-21T00:00:00Z", "dateUpdated": "2024-09-16T17:43:00.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }