Vulnerabilites related to asus - rt-n14u_firmware
cve-2014-2719
Vulnerability from cvelistv5
Published
2014-04-21 14:00
Modified
2024-08-06 10:21
Severity ?
EPSS score ?
Summary
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
References
▼ | URL | Tags |
---|---|---|
http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html | x_refsource_MISC | |
http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2014/Apr/225 | mailing-list, x_refsource_FULLDISC | |
https://support.t-mobile.com/docs/DOC-21994 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:21:36.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29" }, { "name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/225" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.t-mobile.com/docs/DOC-21994" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-09-16T13:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29" }, { "name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Apr/225" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.t-mobile.com/docs/DOC-21994" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2719", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html", "refsource": "MISC", "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html" }, { "name": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29", "refsource": "CONFIRM", "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29" }, { "name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Apr/225" }, { "name": "https://support.t-mobile.com/docs/DOC-21994", "refsource": "CONFIRM", "url": "https://support.t-mobile.com/docs/DOC-21994" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2719", "datePublished": "2014-04-21T14:00:00", "dateReserved": "2014-04-01T00:00:00", "dateUpdated": "2024-08-06T10:21:36.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4937
Vulnerability from cvelistv5
Published
2013-07-26 10:00
Modified
2024-09-17 02:46
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://reviews.cnet.com/8301-3132_7-57594003-98 | x_refsource_MISC | |
http://twitter.com/ASUSUSA/statuses/357612236392509440 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-26T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://reviews.cnet.com/8301-3132_7-57594003-98", "refsource": "MISC", "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "name": "http://twitter.com/ASUSUSA/statuses/357612236392509440", "refsource": "CONFIRM", "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4937", "datePublished": "2013-07-26T10:00:00Z", "dateReserved": "2013-07-26T00:00:00Z", "dateUpdated": "2024-09-17T02:46:42.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-07-26 12:05
Modified
2024-11-21 01:56
Severity ?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BC5E8AB-ADD3-4C8D-ABAB-6D899174280E", "versionEndIncluding": "3.0.0.4.354", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*", "matchCriteriaId": "A946A449-7623-48FE-878A-E17DA2F41A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*", "matchCriteriaId": "A023852A-84B7-4937-886D-8893CD778DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*", "matchCriteriaId": "FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*", "matchCriteriaId": "553DE051-C59F-4B16-A733-C2055B14DB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*", "matchCriteriaId": "37AE944A-EF53-4F57-8A86-7DE209F00D17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C801E60F-6D3D-4179-AA38-1268338C03DE", "versionEndIncluding": "3.0.0.4.370", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*", "matchCriteriaId": "82C3DA99-69D6-4C2D-B485-7785EEDA38F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D4769A7-BFC5-43DF-9FEE-14CC9BB8BD4F", "versionEndIncluding": "3.0.0.4.346", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*", "matchCriteriaId": "02E9974C-F3E1-4145-865F-974982804823", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*", "matchCriteriaId": "B3979CD4-DFBC-460C-8E92-879F7C355D52", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*", "matchCriteriaId": "1EA3F63E-F4FA-4066-AEA0-B1149E4B1190", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*", "matchCriteriaId": "1E9A77E0-1CC3-4E07-B99A-8DC750C982F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*", "matchCriteriaId": "642056A2-9B4E-465C-8333-392C70D658AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5567C97-0AE2-429B-B4D7-1CF501BD2C07", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B3FB0ED-9BF8-4F77-AEA0-536A961CE5F5", "versionEndIncluding": "3.0.0.4.356", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*", "matchCriteriaId": "C7A0A4C1-226A-42D5-A728-CBB7D2B02A50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85B0C29C-29A5-4659-8D76-9241B13682DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE3A93F2-C6C1-48F9-9273-3A322A8951A8", "versionEndIncluding": "3.0.0.4.354", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "C76611FB-9811-48E5-8F16-824A15CFC226", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6887911A-9CD0-419C-AE2E-932F8AD179DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*", "matchCriteriaId": "65D943A4-CD5D-4381-8C4F-FF4FC600F226", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*", "matchCriteriaId": "5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*", "matchCriteriaId": "939D788D-BFF7-4DEB-8C47-751532E4AC36", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*", "matchCriteriaId": "DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*", "matchCriteriaId": "8C1CCB22-3D8D-4618-819B-2EA14C42A4C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*", "matchCriteriaId": "715FFC31-33A1-469E-BF65-4749F6643EEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*", "matchCriteriaId": "2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E016FE0-0A28-49AA-A213-38A5F7728FE2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3027E138-144F-4E36-8C6C-E4A3E71CB1E7", "versionEndIncluding": "3.0.0.4.360", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D8E3CB7-1ADA-428C-881F-BB266991F39D", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*", "matchCriteriaId": "699F6C57-F1AE-4AF5-BF56-529D41C91068", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*", "matchCriteriaId": "F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*", "matchCriteriaId": "69C68ABB-391D-45D8-9250-D93F8BFE305C", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*", "matchCriteriaId": "D1FDDF9C-4C30-4AAC-9449-7404181071B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*", "matchCriteriaId": "2DE8F24A-837B-4198-B8F6-E42386D2F524", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*", "matchCriteriaId": "14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*", "matchCriteriaId": "E2660735-2247-42D9-9BAA-D785D18E6F51", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*", "matchCriteriaId": "401BB537-95FB-4BFB-BC40-CD73817D7E9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*", "matchCriteriaId": "04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "8CF40558-B7F8-4A2B-9819-EE3DD2C183AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F70D82C1-764C-4DF0-B296-964602D0EC54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6573DB51-CD36-4F99-82D6-EE52CA0E5136", "versionEndIncluding": "3.0.0.4.364", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3A02DC87-A0B4-460F-BE23-AFF51F52427C", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.188:*:*:*:*:*:*:*", "matchCriteriaId": "AE119718-A2F2-47A8-869F-3229A788EB04", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.314:*:*:*:*:*:*:*", "matchCriteriaId": "5199B461-E2F0-4F35-963E-B3716AB5A04E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:dsl-n55u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B81970C5-B766-4D2E-91EE-ADD5A9B77FF8", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en la caracter\u00edstica AiCloud de los ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, y DSL-N55U con firmware anteriores a v3.0.4.372 tienen impacto y vectores de ataque desconocidos." } ], "id": "CVE-2013-4937", "lastModified": "2024-11-21T01:56:43.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-26T12:05:40.867", "references": [ { "source": "cve@mitre.org", "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "source": "cve@mitre.org", "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://reviews.cnet.com/8301-3132_7-57594003-98" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-22 13:06
Modified
2024-11-21 02:06
Severity ?
Summary
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*", "matchCriteriaId": "A946A449-7623-48FE-878A-E17DA2F41A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*", "matchCriteriaId": "A023852A-84B7-4937-886D-8893CD778DDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*", "matchCriteriaId": "FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*", "matchCriteriaId": "553DE051-C59F-4B16-A733-C2055B14DB1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*", "matchCriteriaId": "37AE944A-EF53-4F57-8A86-7DE209F00D17", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.354:*:*:*:*:*:*:*", "matchCriteriaId": "7AE0E4E9-B08F-4DB3-A5D5-DBCDA81E4200", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374.4755:*:*:*:*:*:*:*", "matchCriteriaId": "536FCD9A-4DBA-465D-8FE8-9E9D815BAB81", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4561:*:*:*:*:*:*:*", "matchCriteriaId": "6E3E3F39-1F5A-4AE5-A379-3344BFC1E00D", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4887:*:*:*:*:*:*:*", "matchCriteriaId": "753D3C81-F078-47B9-8D0B-822EBE9443AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "AEB012B3-5C57-4310-8F1A-208D2E470A6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "8F1D15BC-D83F-4949-863B-817FA2A0A23D", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "0ACDCE11-5422-4AB1-AC89-3C3DF05FDE1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7607C5-EF0C-40FA-BADA-2316BA4A5E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "340D98A2-2018-4A24-B654-3A7032FCE518", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "94999CA4-A60A-4F1E-8933-2CB1CA9D83A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "132C4DDD-5914-47E0-BDBA-E918E7F0E747", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*", "matchCriteriaId": "C7A0A4C1-226A-42D5-A728-CBB7D2B02A50", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.356:*:*:*:*:*:*:*", "matchCriteriaId": "3A04943B-0627-4B6D-A01A-3722F7025723", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "C76611FB-9811-48E5-8F16-824A15CFC226", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6887911A-9CD0-419C-AE2E-932F8AD179DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*", "matchCriteriaId": "65D943A4-CD5D-4381-8C4F-FF4FC600F226", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*", "matchCriteriaId": "5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*", "matchCriteriaId": "939D788D-BFF7-4DEB-8C47-751532E4AC36", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*", "matchCriteriaId": "DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*", "matchCriteriaId": "8C1CCB22-3D8D-4618-819B-2EA14C42A4C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*", "matchCriteriaId": "715FFC31-33A1-469E-BF65-4749F6643EEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.354:*:*:*:*:*:*:*", "matchCriteriaId": "C1A3AFBC-A89F-4037-B863-55F7791A3635", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*", "matchCriteriaId": "2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "6D8E3CB7-1ADA-428C-881F-BB266991F39D", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*", "matchCriteriaId": "699F6C57-F1AE-4AF5-BF56-529D41C91068", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*", "matchCriteriaId": "F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*", "matchCriteriaId": "69C68ABB-391D-45D8-9250-D93F8BFE305C", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*", "matchCriteriaId": "D1FDDF9C-4C30-4AAC-9449-7404181071B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*", "matchCriteriaId": "2DE8F24A-837B-4198-B8F6-E42386D2F524", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*", "matchCriteriaId": "14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*", "matchCriteriaId": "E2660735-2247-42D9-9BAA-D785D18E6F51", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*", "matchCriteriaId": "401BB537-95FB-4BFB-BC40-CD73817D7E9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*", "matchCriteriaId": "04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.360:*:*:*:*:*:*:*", "matchCriteriaId": "C3C65A6B-4F24-4DFE-B478-49BEE4A5FC65", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "8CF40558-B7F8-4A2B-9819-EE3DD2C183AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F70D82C1-764C-4DF0-B296-964602D0EC54", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*", "matchCriteriaId": "02E9974C-F3E1-4145-865F-974982804823", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*", "matchCriteriaId": "B3979CD4-DFBC-460C-8E92-879F7C355D52", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*", "matchCriteriaId": "1EA3F63E-F4FA-4066-AEA0-B1149E4B1190", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*", "matchCriteriaId": "1E9A77E0-1CC3-4E07-B99A-8DC750C982F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*", "matchCriteriaId": "642056A2-9B4E-465C-8333-392C70D658AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.346:*:*:*:*:*:*:*", "matchCriteriaId": "8E68C357-45E5-4086-9697-A9DD75E22063", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*", "matchCriteriaId": "82C3DA99-69D6-4C2D-B485-7785EEDA38F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.370:*:*:*:*:*:*:*", "matchCriteriaId": "16CE2D06-AFAB-4284-9C63-A088F4ACEBAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*", "matchCriteriaId": "919D9673-1FCA-431D-9F30-643AAEFAC1DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code." }, { "lang": "es", "value": "Advanced_System_Content.asp en routers de la serie ASUS RT con firmware anterior a 3.0.0.4.374.5517, cuando una sesi\u00f3n de administrador est\u00e1 activa, permite a usuarios remotos autenticados obtener el nombre de usuario y contrase\u00f1a del administrador mediante la lectura del c\u00f3digo fuente." } ], "id": "CVE-2014-2719", "lastModified": "2024-11-21T02:06:49.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-22T13:06:29.493", "references": [ { "source": "cve@mitre.org", "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2014/Apr/225" }, { "source": "cve@mitre.org", "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29" }, { "source": "cve@mitre.org", "url": "https://support.t-mobile.com/docs/DOC-21994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Apr/225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.t-mobile.com/docs/DOC-21994" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }