Vulnerabilites related to asus - rt-n56u_firmware
Vulnerability from fkie_nvd
Published
2020-01-28 21:15
Modified
2024-11-21 01:52
Summary
ASUS RT-N56U devices allow CSRF.
Impacted products
Vendor Product Version
asus rt-n56u_firmware 3.0.0.4.374_979
asus rt-n56u -
asus rt-n10u_firmware 3.0.0.4.374_168
asus rt-n10u -
asus dsl-n55u_firmware 3.0.0.4.374_1397
asus dsl-n55u -
asus rt-ac66u_firmware 3.0.0.4.374_2050
asus rt-ac66u -
asus rt-n15u_firmware 3.0.0.4.374_16
asus rt-n15u -
asus rt-n53_firmware 3.0.0.4.374_311
asus rt-n53 -
asus rt-n16_firmware 3.0.0.4.374_979
asus rt-n16 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.374_979:*:*:*:*:*:*:*",
              "matchCriteriaId": "71FB53A0-E6FE-44AB-9C58-3D171D014C89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n10u_firmware:3.0.0.4.374_168:*:*:*:*:*:*:*",
              "matchCriteriaId": "829CAB34-EED3-4CE7-94D7-CAD9065F23EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n10u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4DE1E4-5956-47DE-A3E5-41BACE56ECDD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:dsl-n55u_firmware:3.0.0.4.374_1397:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF2B1DD-066D-4CF0-8B20-4BB0004AEDC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:dsl-n55u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B81970C5-B766-4D2E-91EE-ADD5A9B77FF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.374_2050:*:*:*:*:*:*:*",
              "matchCriteriaId": "06072740-9813-463A-BE8D-005494458924",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n15u_firmware:3.0.0.4.374_16:*:*:*:*:*:*:*",
              "matchCriteriaId": "373F0934-4234-4047-9FD1-100847A5BDF2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n15u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1E024B-4966-43E5-882D-549E3DCF09FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n53_firmware:3.0.0.4.374_311:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B18E8F-EB3B-4766-8053-5C6890178305",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n53:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5055A58-33A0-4CC4-A855-50ABE0A4F358",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.374_979:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8FDC5CE-25FC-489E-9E4C-88FC8C885576",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E016FE0-0A28-49AA-A213-38A5F7728FE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ASUS RT-N56U devices allow CSRF."
    },
    {
      "lang": "es",
      "value": "Los dispositivos ASUS RT-N56U, permiten un ataque de tipo CSRF."
    }
  ],
  "id": "CVE-2013-3093",
  "lastModified": "2024-11-21T01:52:59.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-28T21:15:11.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/archive/1/531194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.securityfocus.com/archive/1/531194"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-07-26 12:05
Modified
2024-11-21 01:56
Severity ?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
Impacted products
Vendor Product Version
asus rt-ac66u_firmware *
asus rt-ac66u_firmware 3.0.0.4.140
asus rt-ac66u_firmware 3.0.0.4.220
asus rt-ac66u_firmware 3.0.0.4.246
asus rt-ac66u_firmware 3.0.0.4.260
asus rt-ac66u_firmware 3.0.0.4.270
asus rt-ac66u -
asus rt-n66u_firmware *
asus rt-n66u_firmware 3.0.0.4.272
asus rt-n66u -
asus rt-n65u_firmware *
asus rt-n65u_firmware 3.0.0.3.134
asus rt-n65u_firmware 3.0.0.3.176
asus rt-n65u_firmware 3.0.0.4.260
asus rt-n65u_firmware 3.0.0.4.334
asus rt-n65u_firmware 3.0.0.4.342
asus rt-n65u -
asus rt-n14u_firmware *
asus rt-n14u_firmware 3.0.0.4.322
asus rt-n14u -
asus rt-n16_firmware *
asus rt-n16_firmware 1.0.1.9
asus rt-n16_firmware 1.0.2.3
asus rt-n16_firmware 3.0.0.3.108
asus rt-n16_firmware 3.0.0.3.162
asus rt-n16_firmware 3.0.0.3.178
asus rt-n16_firmware 3.0.0.4.220
asus rt-n16_firmware 3.0.0.4.246
asus rt-n16_firmware 3.0.0.4.260
asus rt-n16_firmware 7.0.2.38b
asus rt-n16 -
asus rt-n56u_firmware *
asus rt-n56u_firmware 1.0.1.4
asus rt-n56u_firmware 1.0.1.4o
asus rt-n56u_firmware 1.0.1.7c
asus rt-n56u_firmware 1.0.1.7f
asus rt-n56u_firmware 1.0.1.8j
asus rt-n56u_firmware 1.0.1.8l
asus rt-n56u_firmware 1.0.1.8n
asus rt-n56u_firmware 3.0.0.4.318
asus rt-n56u_firmware 3.0.0.4.334
asus rt-n56u_firmware 3.0.0.4.342
asus rt-n56u_firmware 7.0.1.21
asus rt-n56u_firmware 7.0.1.32
asus rt-n56u_firmware 8.1.1.4
asus rt-n56u -
asus dsl-n56u_firmware *
asus dsl-n56u_firmware 1.0.0.9
asus dsl-n56u_firmware 3.0.0.4.188
asus dsl-n56u_firmware 3.0.0.4.314
asus dsl-n55u -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC5E8AB-ADD3-4C8D-ABAB-6D899174280E",
              "versionEndIncluding": "3.0.0.4.354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "A946A449-7623-48FE-878A-E17DA2F41A11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "A023852A-84B7-4937-886D-8893CD778DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "553DE051-C59F-4B16-A733-C2055B14DB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AE944A-EF53-4F57-8A86-7DE209F00D17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C801E60F-6D3D-4179-AA38-1268338C03DE",
              "versionEndIncluding": "3.0.0.4.370",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C3DA99-69D6-4C2D-B485-7785EEDA38F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D4769A7-BFC5-43DF-9FEE-14CC9BB8BD4F",
              "versionEndIncluding": "3.0.0.4.346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*",
              "matchCriteriaId": "02E9974C-F3E1-4145-865F-974982804823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3979CD4-DFBC-460C-8E92-879F7C355D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA3F63E-F4FA-4066-AEA0-B1149E4B1190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9A77E0-1CC3-4E07-B99A-8DC750C982F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
              "matchCriteriaId": "642056A2-9B4E-465C-8333-392C70D658AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5567C97-0AE2-429B-B4D7-1CF501BD2C07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3FB0ED-9BF8-4F77-AEA0-536A961CE5F5",
              "versionEndIncluding": "3.0.0.4.356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A0A4C1-226A-42D5-A728-CBB7D2B02A50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85B0C29C-29A5-4659-8D76-9241B13682DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE3A93F2-C6C1-48F9-9273-3A322A8951A8",
              "versionEndIncluding": "3.0.0.4.354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C76611FB-9811-48E5-8F16-824A15CFC226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6887911A-9CD0-419C-AE2E-932F8AD179DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D943A4-CD5D-4381-8C4F-FF4FC600F226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*",
              "matchCriteriaId": "939D788D-BFF7-4DEB-8C47-751532E4AC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C1CCB22-3D8D-4618-819B-2EA14C42A4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "715FFC31-33A1-469E-BF65-4749F6643EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E016FE0-0A28-49AA-A213-38A5F7728FE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3027E138-144F-4E36-8C6C-E4A3E71CB1E7",
              "versionEndIncluding": "3.0.0.4.360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8E3CB7-1ADA-428C-881F-BB266991F39D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*",
              "matchCriteriaId": "699F6C57-F1AE-4AF5-BF56-529D41C91068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C68ABB-391D-45D8-9250-D93F8BFE305C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1FDDF9C-4C30-4AAC-9449-7404181071B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DE8F24A-837B-4198-B8F6-E42386D2F524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2660735-2247-42D9-9BAA-D785D18E6F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
              "matchCriteriaId": "401BB537-95FB-4BFB-BC40-CD73817D7E9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
              "matchCriteriaId": "04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF40558-B7F8-4A2B-9819-EE3DD2C183AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70D82C1-764C-4DF0-B296-964602D0EC54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6573DB51-CD36-4F99-82D6-EE52CA0E5136",
              "versionEndIncluding": "3.0.0.4.364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A02DC87-A0B4-460F-BE23-AFF51F52427C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.188:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE119718-A2F2-47A8-869F-3229A788EB04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.314:*:*:*:*:*:*:*",
              "matchCriteriaId": "5199B461-E2F0-4F35-963E-B3716AB5A04E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:dsl-n55u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B81970C5-B766-4D2E-91EE-ADD5A9B77FF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en la caracter\u00edstica AiCloud de los ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, y DSL-N55U con firmware anteriores a v3.0.4.372 tienen impacto y vectores de ataque desconocidos."
    }
  ],
  "id": "CVE-2013-4937",
  "lastModified": "2024-11-21T01:56:43.360",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-26T12:05:40.867",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-01-30 04:59
Modified
2024-11-21 03:28
Summary
An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an "nmap -O" command that specifies an IP address of an affected device, one can crash the device's WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network.
Impacted products
Vendor Product Version
asus rt-n56u_firmware 3.0.0.4.374_979
asus rt-n56u -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.374_979:*:*:*:*:*:*:*",
              "matchCriteriaId": "71FB53A0-E6FE-44AB-9C58-3D171D014C89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an \"nmap -O\" command that specifies an IP address of an affected device, one can crash the device\u0027s WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network."
    },
    {
      "lang": "es",
      "value": "Se ha descubierto un problema en el router wireless ASUS RT-N56U con Firmware 3.0.0.4.374_979. Al ejecutar un comando \"nmap -O\" que especifica una direcci\u00f3n IP de un dispositivo infectado, se puede derribar la conexi\u00f3n WAN del dispositivo WAN, causando una desconexi\u00f3n de internet, una denegaci\u00f3n de servicio (DoS). El ataque solo es posible desde dentro de la red de \u00e1rea local."
    }
  ],
  "id": "CVE-2017-5632",
  "lastModified": "2024-11-21T03:28:03.417",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-30T04:59:00.737",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95857"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-22 05:22
Modified
2024-11-21 01:59
Severity ?
Summary
Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp.
Impacted products
Vendor Product Version
asus tm-ac1900_firmware 3.0.0.4..374_979
asus tm-ac1900 -
asus rt-n56u_firmware 3.0.0.4..374_979
asus rt-n56u -
asus rt-ac66u_firmware 3.0.0.4..374_979
asus rt-ac66u -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:tm-ac1900_firmware:3.0.0.4..374_979:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD9DC72-BBEA-4152-9109-2C0136832B4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:tm-ac1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BB1518-24C4-4822-A040-9AB8F16B1C53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4..374_979:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D76427C-05A6-475E-A199-3E86683CF266",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4..374_979:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DE8B4-C6E2-4292-8CD5-D890515E9F6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en web.c de httpd en routers ASUS RT-N56U y RT-AC66U con firmware 3.0.0.4.374_979 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de par\u00e1metros (1) apps_name o (2) apps_flag hacia APP_Installation.asp."
    }
  ],
  "id": "CVE-2013-6343",
  "lastModified": "2024-11-21T01:59:02.770",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-22T05:22:12.737",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/102267"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/31033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/65046"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.t-mobile.com/docs/DOC-21994"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/102267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/31033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/65046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.t-mobile.com/docs/DOC-21994"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-04-22 13:06
Modified
2024-11-21 02:06
Severity ?
Summary
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
Impacted products
Vendor Product Version
asus rt-ac66u_firmware 3.0.0.4.140
asus rt-ac66u_firmware 3.0.0.4.220
asus rt-ac66u_firmware 3.0.0.4.246
asus rt-ac66u_firmware 3.0.0.4.260
asus rt-ac66u_firmware 3.0.0.4.270
asus rt-ac66u_firmware 3.0.0.4.354
asus rt-ac68u_firmware 3.0.0.4.374.4755
asus rt-ac68u_firmware 3.0.0.4.374_4561
asus rt-ac68u_firmware 3.0.0.4.374_4887
asus rt-n10e_firmware 2.0.0.7
asus rt-n10e_firmware 2.0.0.10
asus rt-n10e_firmware 2.0.0.16
asus rt-n10e_firmware 2.0.0.19
asus rt-n10e_firmware 2.0.0.20
asus rt-n10e_firmware 2.0.0.24
asus rt-n10e_firmware 2.0.0.25
asus rt-n14u_firmware 3.0.0.4.322
asus rt-n14u_firmware 3.0.0.4.356
asus rt-n16_firmware 1.0.1.9
asus rt-n16_firmware 1.0.2.3
asus rt-n16_firmware 3.0.0.3.108
asus rt-n16_firmware 3.0.0.3.162
asus rt-n16_firmware 3.0.0.3.178
asus rt-n16_firmware 3.0.0.4.220
asus rt-n16_firmware 3.0.0.4.246
asus rt-n16_firmware 3.0.0.4.260
asus rt-n16_firmware 3.0.0.4.354
asus rt-n16_firmware 7.0.2.38b
asus rt-n56u_firmware 1.0.1.4
asus rt-n56u_firmware 1.0.1.4o
asus rt-n56u_firmware 1.0.1.7c
asus rt-n56u_firmware 1.0.1.7f
asus rt-n56u_firmware 1.0.1.8j
asus rt-n56u_firmware 1.0.1.8l
asus rt-n56u_firmware 1.0.1.8n
asus rt-n56u_firmware 3.0.0.4.318
asus rt-n56u_firmware 3.0.0.4.334
asus rt-n56u_firmware 3.0.0.4.342
asus rt-n56u_firmware 3.0.0.4.360
asus rt-n56u_firmware 7.0.1.21
asus rt-n56u_firmware 7.0.1.32
asus rt-n56u_firmware 8.1.1.4
asus rt-n65u_firmware 3.0.0.3.134
asus rt-n65u_firmware 3.0.0.3.176
asus rt-n65u_firmware 3.0.0.4.260
asus rt-n65u_firmware 3.0.0.4.334
asus rt-n65u_firmware 3.0.0.4.342
asus rt-n65u_firmware 3.0.0.4.346
asus rt-n66u_firmware 3.0.0.4.272
asus rt-n66u_firmware 3.0.0.4.370
asus rt-ac68u -
t-mobile tm-ac1900 3.0.0.4.376_3169



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*",
              "matchCriteriaId": "A946A449-7623-48FE-878A-E17DA2F41A11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "A023852A-84B7-4937-886D-8893CD778DDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "553DE051-C59F-4B16-A733-C2055B14DB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AE944A-EF53-4F57-8A86-7DE209F00D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.354:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE0E4E9-B08F-4DB3-A5D5-DBCDA81E4200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374.4755:*:*:*:*:*:*:*",
              "matchCriteriaId": "536FCD9A-4DBA-465D-8FE8-9E9D815BAB81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4561:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3E3F39-1F5A-4AE5-A379-3344BFC1E00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4887:*:*:*:*:*:*:*",
              "matchCriteriaId": "753D3C81-F078-47B9-8D0B-822EBE9443AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEB012B3-5C57-4310-8F1A-208D2E470A6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1D15BC-D83F-4949-863B-817FA2A0A23D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACDCE11-5422-4AB1-AC89-3C3DF05FDE1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C7607C5-EF0C-40FA-BADA-2316BA4A5E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "340D98A2-2018-4A24-B654-3A7032FCE518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "94999CA4-A60A-4F1E-8933-2CB1CA9D83A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "132C4DDD-5914-47E0-BDBA-E918E7F0E747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A0A4C1-226A-42D5-A728-CBB7D2B02A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.356:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A04943B-0627-4B6D-A01A-3722F7025723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C76611FB-9811-48E5-8F16-824A15CFC226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6887911A-9CD0-419C-AE2E-932F8AD179DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D943A4-CD5D-4381-8C4F-FF4FC600F226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*",
              "matchCriteriaId": "939D788D-BFF7-4DEB-8C47-751532E4AC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C1CCB22-3D8D-4618-819B-2EA14C42A4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "715FFC31-33A1-469E-BF65-4749F6643EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.354:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1A3AFBC-A89F-4037-B863-55F7791A3635",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8E3CB7-1ADA-428C-881F-BB266991F39D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*",
              "matchCriteriaId": "699F6C57-F1AE-4AF5-BF56-529D41C91068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C68ABB-391D-45D8-9250-D93F8BFE305C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1FDDF9C-4C30-4AAC-9449-7404181071B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DE8F24A-837B-4198-B8F6-E42386D2F524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2660735-2247-42D9-9BAA-D785D18E6F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
              "matchCriteriaId": "401BB537-95FB-4BFB-BC40-CD73817D7E9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
              "matchCriteriaId": "04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.360:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3C65A6B-4F24-4DFE-B478-49BEE4A5FC65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF40558-B7F8-4A2B-9819-EE3DD2C183AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70D82C1-764C-4DF0-B296-964602D0EC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*",
              "matchCriteriaId": "02E9974C-F3E1-4145-865F-974982804823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3979CD4-DFBC-460C-8E92-879F7C355D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA3F63E-F4FA-4066-AEA0-B1149E4B1190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E9A77E0-1CC3-4E07-B99A-8DC750C982F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
              "matchCriteriaId": "642056A2-9B4E-465C-8333-392C70D658AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.346:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E68C357-45E5-4086-9697-A9DD75E22063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C3DA99-69D6-4C2D-B485-7785EEDA38F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.370:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CE2D06-AFAB-4284-9C63-A088F4ACEBAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*",
              "matchCriteriaId": "919D9673-1FCA-431D-9F30-643AAEFAC1DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
    },
    {
      "lang": "es",
      "value": "Advanced_System_Content.asp en routers de la serie ASUS RT con firmware anterior a 3.0.0.4.374.5517, cuando una sesi\u00f3n de administrador est\u00e1 activa, permite a usuarios remotos autenticados obtener el nombre de usuario y contrase\u00f1a del administrador mediante la lectura del c\u00f3digo fuente."
    }
  ],
  "id": "CVE-2014-2719",
  "lastModified": "2024-11-21T02:06:49.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 6.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-04-22T13:06:29.493",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2014/Apr/225"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.t-mobile.com/docs/DOC-21994"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2014/Apr/225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.t-mobile.com/docs/DOC-21994"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-11-21 11:55
Modified
2024-11-21 01:32
Severity ?
Summary
QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request.
Impacted products
Vendor Product Version
asus rt-n56u_firmware *
asus rt-n56u_firmware 1.0.0.9
asus rt-n56u_firmware 1.0.1.2
asus rt-n56u_firmware 1.0.1.3
asus rt-n56u *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD609AB-D284-42A2-8799-EB6F9A57FFB3",
              "versionEndIncluding": "1.0.1.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asus:rt-n56u_firmware:1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED6FB105-870B-431C-8657-D90E2EA97BD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asus:rt-n56u_firmware:1.0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C418EA-19B4-4014-87CD-635A4C9ECA03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:asus:rt-n56u_firmware:1.0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "29348DD0-3B87-4817-BCE7-942C48AF8F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45140849-3F44-4866-850D-195B393F2849",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request."
    },
    {
      "lang": "es",
      "value": "QIS_wizard.htm en el router ASUS RT-N56U con firmware antes de v1.0.1.4o permite a atacantes remotodos obtener la contrase\u00f1a del administrador a trav\u00e9s de una petici\u00f3n flag=detect"
    }
  ],
  "id": "CVE-2011-4497",
  "lastModified": "2024-11-21T01:32:25.223",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-11-21T11:55:03.557",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/200814"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/200814"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-02-01 15:59
Modified
2024-11-21 02:16
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00D344B-E6F4-43E6-AC9F-CC1D0ACEB03D",
              "versionEndIncluding": "3.0.0.4.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9CE8AF-0F34-49E9-B57C-A0EE82A55CB8",
              "versionEndIncluding": "3.0.0.4.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac87u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ECCC5BB-8B10-4712-B33A-FE6CDDD826F2",
              "versionEndIncluding": "3.0.0.4.378.3754",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EFEF79F-9383-4091-B013-B3FD9F7A4E73",
              "versionEndIncluding": "3.0.0.4.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac56s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "866A3E80-E93C-4C00-B8CD-B040617D4B4E",
              "versionEndIncluding": "3.0.0.4.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A1E548-F12D-4BF7-9C01-1325A725FF91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de CSRF en los routers ASUS JAPAN RT-AC87U con firmware 3.0.0.4.378.3754 y anteriores, los routers RT-AC68U con firmware 3.0.0.4.376.3715 y anteriores, los routers RT-AC56S con firmware 3.0.0.4.376.3715 y anteriores, los routers RT-N66U con firmware 3.0.0.4.376.3715 y anteriores, y los routers RT-N56U con firmware 3.0.0.4.376.3715 y anteriores permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios."
    }
  ],
  "id": "CVE-2014-7270",
  "lastModified": "2024-11-21T02:16:39.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-02-01T15:59:03.323",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN32631078/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN32631078/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-02-01 15:59
Modified
2024-11-21 02:16
Severity ?
Summary
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F00D344B-E6F4-43E6-AC9F-CC1D0ACEB03D",
              "versionEndIncluding": "3.0.0.4.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac56s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "866A3E80-E93C-4C00-B8CD-B040617D4B4E",
              "versionEndIncluding": "3.0.0.4.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A1E548-F12D-4BF7-9C01-1325A725FF91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EFEF79F-9383-4091-B013-B3FD9F7A4E73",
              "versionEndIncluding": "3.0.0.4.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac87u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ECCC5BB-8B10-4712-B33A-FE6CDDD826F2",
              "versionEndIncluding": "3.0.0.4.378.3754",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68AB4431-1D6E-4D5C-86E8-F78CECF82AFB",
              "versionEndIncluding": "3.0.0.376.3715",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Los routers ASUS JAPAN RT-AC87U con firmware 3.0.0.4.378.3754 y anteriores, los routers RT-AC68U con firmware 3.0.0.4.376.3715 y anteriores, los routers RT-AC56S con firmware 3.0.0.4.376.3715 y anteriores, lor routers RT-N66U con firmware 3.0.0.4.376.3715 y anteriores, y los routers RT-N56U con firmware 3.0.0.4.376.3715 y anteriores permiten a usuarios remotos autenticados ejecutar comandos OS arbitrarios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2014-7269",
  "lastModified": "2024-11-21T02:16:38.947",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-02-01T15:59:01.917",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN77792759/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN77792759/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-13 15:15
Modified
2024-11-21 01:56
Severity ?
Summary
Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FFDE31E-5C68-4DC7-9B4A-C19F1719CA91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:asus:rt-n56u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CAB8E5-7FB5-48CD-B68A-1ACE07E8EA8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Salto de Enlace Simb\u00f3lico en ASUS RT-AC66U y RT-N56U debido a una configuraci\u00f3n inapropiada en el servicio SMB."
    }
  ],
  "id": "CVE-2013-4656",
  "lastModified": "2024-11-21T01:56:00.100",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-13T15:15:09.963",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://www.ise.io/casestudies/exploiting-soho-routers/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.ise.io/soho_service_hacks/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://www.ise.io/casestudies/exploiting-soho-routers/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.ise.io/soho_service_hacks/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2014-2719
Vulnerability from cvelistv5
Published
2014-04-21 14:00
Modified
2024-08-06 10:21
Severity ?
Summary
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:21:36.055Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
          },
          {
            "name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Apr/225"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.t-mobile.com/docs/DOC-21994"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-09-16T13:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
        },
        {
          "name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Apr/225"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.t-mobile.com/docs/DOC-21994"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-2719",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html",
              "refsource": "MISC",
              "url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
            },
            {
              "name": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29",
              "refsource": "CONFIRM",
              "url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
            },
            {
              "name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Apr/225"
            },
            {
              "name": "https://support.t-mobile.com/docs/DOC-21994",
              "refsource": "CONFIRM",
              "url": "https://support.t-mobile.com/docs/DOC-21994"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-2719",
    "datePublished": "2014-04-21T14:00:00",
    "dateReserved": "2014-04-01T00:00:00",
    "dateUpdated": "2024-08-06T10:21:36.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4656
Vulnerability from cvelistv5
Published
2019-11-13 14:44
Modified
2024-08-06 16:52
Severity ?
Summary
Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:26.504Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ise.io/casestudies/exploiting-soho-routers/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ise.io/soho_service_hacks/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-13T14:44:05",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ise.io/casestudies/exploiting-soho-routers/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ise.io/soho_service_hacks/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-4656",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ise.io/casestudies/exploiting-soho-routers/",
              "refsource": "MISC",
              "url": "https://www.ise.io/casestudies/exploiting-soho-routers/"
            },
            {
              "name": "https://www.ise.io/soho_service_hacks/",
              "refsource": "MISC",
              "url": "https://www.ise.io/soho_service_hacks/"
            },
            {
              "name": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf",
              "refsource": "MISC",
              "url": "https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-4656",
    "datePublished": "2019-11-13T14:44:05",
    "dateReserved": "2013-06-24T00:00:00",
    "dateUpdated": "2024-08-06T16:52:26.504Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7269
Vulnerability from cvelistv5
Published
2015-02-01 15:00
Modified
2024-08-06 12:47
Severity ?
Summary
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors.
References
http://jvn.jp/en/jp/JVN77792759/index.htmlthird-party-advisory, x_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011third-party-advisory, x_refsource_JVNDB
http://www.asus.com/jp/News/PNzPd7vkXtrKWXHRx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:47:31.627Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#77792759",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN77792759/index.html"
          },
          {
            "name": "JVNDB-2015-000011",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-01-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-02-01T15:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#77792759",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN77792759/index.html"
        },
        {
          "name": "JVNDB-2015-000011",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-7269",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#77792759",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN77792759/index.html"
            },
            {
              "name": "JVNDB-2015-000011",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011"
            },
            {
              "name": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR",
              "refsource": "CONFIRM",
              "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-7269",
    "datePublished": "2015-02-01T15:00:00",
    "dateReserved": "2014-09-30T00:00:00",
    "dateUpdated": "2024-08-06T12:47:31.627Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7270
Vulnerability from cvelistv5
Published
2015-02-01 15:00
Modified
2024-08-06 12:47
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users.
References
http://jvn.jp/en/jp/JVN32631078/index.htmlthird-party-advisory, x_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012third-party-advisory, x_refsource_JVNDB
http://www.asus.com/jp/News/PNzPd7vkXtrKWXHRx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:47:32.319Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#32631078",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN32631078/index.html"
          },
          {
            "name": "JVNDB-2015-000012",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-01-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-02-01T15:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#32631078",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN32631078/index.html"
        },
        {
          "name": "JVNDB-2015-000012",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-7270",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#32631078",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN32631078/index.html"
            },
            {
              "name": "JVNDB-2015-000012",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000012"
            },
            {
              "name": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR",
              "refsource": "CONFIRM",
              "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-7270",
    "datePublished": "2015-02-01T15:00:00",
    "dateReserved": "2014-09-30T00:00:00",
    "dateUpdated": "2024-08-06T12:47:32.319Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4497
Vulnerability from cvelistv5
Published
2011-11-21 11:00
Modified
2024-09-16 22:21
Severity ?
Summary
QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request.
References
http://www.kb.cert.org/vuls/id/200814third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:09:18.475Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#200814",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/200814"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-11-21T11:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#200814",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/200814"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4497",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#200814",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/200814"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4497",
    "datePublished": "2011-11-21T11:00:00Z",
    "dateReserved": "2011-11-21T00:00:00Z",
    "dateUpdated": "2024-09-16T22:21:07.385Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-5632
Vulnerability from cvelistv5
Published
2017-01-30 04:24
Modified
2024-08-05 15:04
Severity ?
Summary
An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an "nmap -O" command that specifies an IP address of an affected device, one can crash the device's WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:04:15.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/"
          },
          {
            "name": "95857",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95857"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-01-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an \"nmap -O\" command that specifies an IP address of an affected device, one can crash the device\u0027s WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-01-31T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/"
        },
        {
          "name": "95857",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95857"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an \"nmap -O\" command that specifies an IP address of an affected device, one can crash the device\u0027s WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/",
              "refsource": "MISC",
              "url": "https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/"
            },
            {
              "name": "95857",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95857"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5632",
    "datePublished": "2017-01-30T04:24:00",
    "dateReserved": "2017-01-29T00:00:00",
    "dateUpdated": "2024-08-05T15:04:15.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6343
Vulnerability from cvelistv5
Published
2014-01-22 02:00
Modified
2024-08-06 17:39
Severity ?
Summary
Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.283Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html"
          },
          {
            "name": "102267",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/102267"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.t-mobile.com/docs/DOC-21994"
          },
          {
            "name": "31033",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/31033"
          },
          {
            "name": "65046",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65046"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html"
        },
        {
          "name": "102267",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/102267"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.t-mobile.com/docs/DOC-21994"
        },
        {
          "name": "31033",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/31033"
        },
        {
          "name": "65046",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65046"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6343",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html",
              "refsource": "MISC",
              "url": "http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html"
            },
            {
              "name": "102267",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/102267"
            },
            {
              "name": "https://support.t-mobile.com/docs/DOC-21994",
              "refsource": "CONFIRM",
              "url": "https://support.t-mobile.com/docs/DOC-21994"
            },
            {
              "name": "31033",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/31033"
            },
            {
              "name": "65046",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65046"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6343",
    "datePublished": "2014-01-22T02:00:00",
    "dateReserved": "2013-11-01T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.283Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4937
Vulnerability from cvelistv5
Published
2013-07-26 10:00
Modified
2024-09-17 02:46
Severity ?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:59:40.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-07-26T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-4937",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://reviews.cnet.com/8301-3132_7-57594003-98",
              "refsource": "MISC",
              "url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
            },
            {
              "name": "http://twitter.com/ASUSUSA/statuses/357612236392509440",
              "refsource": "CONFIRM",
              "url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-4937",
    "datePublished": "2013-07-26T10:00:00Z",
    "dateReserved": "2013-07-26T00:00:00Z",
    "dateUpdated": "2024-09-17T02:46:42.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-3093
Vulnerability from cvelistv5
Published
2020-01-28 20:13
Modified
2024-08-06 16:00
Severity ?
Summary
ASUS RT-N56U devices allow CSRF.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:00:09.628Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.securityfocus.com/archive/1/531194"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ASUS RT-N56U devices allow CSRF."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-28T20:13:17",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.securityfocus.com/archive/1/531194"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3093",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ASUS RT-N56U devices allow CSRF."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.securityfocus.com/archive/1/531194",
              "refsource": "MISC",
              "url": "https://www.securityfocus.com/archive/1/531194"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3093",
    "datePublished": "2020-01-28T20:13:17",
    "dateReserved": "2013-04-17T00:00:00",
    "dateUpdated": "2024-08-06T16:00:09.628Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}