var-201502-0454
Vulnerability from variot
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. Multiple wireless LAN routers provided by ASUS JAPAN Inc. contain an OS command injection vulnerability. Masashi Sakai reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary OS command may be executed by an authenticated attacker. In addition, when this vulnerability is exploited along with the vulnerability stated in JVN#32631078, an arbitrary OS command may be executed if a logged in user views a malicious page. ASUS RT Series Routers has an unspecified command injection vulnerability because it failed to properly filter user-supplied input. Allows an attacker to execute arbitrary operating system commands in the context of the affected device. A security vulnerability exists in several ASUS routers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0454", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ac56s", "scope": "lte", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.376.3715" }, { "model": "rt-ac68u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rt-ac56s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rt-ac68u", "scope": "lte", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.376.3715" }, { "model": "rt-n66u", "scope": "lte", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.376.3715" }, { "model": "rt-n56u", "scope": "lte", "trust": 1.0, "vendor": "asus", "version": "3.0.0.376.3715" }, { "model": "rt-ac87u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rt-n56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rt-n66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rt-ac87u", "scope": "lte", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.378.3754" }, { "model": "rt-n66u", "scope": "eq", "trust": 0.9, "vendor": "asus", "version": "3.0.0.4.376.3715" }, { "model": "rt-ac87u", "scope": "eq", "trust": 0.9, "vendor": "asus", "version": "3.0.0.4.378.3754" }, { "model": "rt-ac68u", "scope": "eq", "trust": 0.9, "vendor": "asus", "version": "3.0.0.4.376.3715" }, { "model": "rt-ac56s", "scope": "eq", "trust": 0.9, "vendor": "asus", "version": "3.0.0.4.376.3715" }, { "model": "rt-ac56s", "scope": "eq", "trust": 0.8, "vendor": "asus", "version": "firmware prior to 3.0.0.4.378.6065" }, { "model": "rt-ac68u", "scope": "eq", "trust": 0.8, "vendor": "asus", "version": "firmware prior to 3.0.0.4.378.6152" }, { "model": "rt-ac87u", "scope": "eq", "trust": 0.8, "vendor": "asus", "version": "firmware prior to 3.0.0.4.378.6065" }, { "model": "rt-n56u", "scope": "eq", "trust": 0.8, "vendor": "asus", "version": "firmware prior to 3.0.0.4.378.6065" }, { "model": "rt-n66u", "scope": "eq", "trust": 0.8, "vendor": "asus", "version": "firmware prior to 3.0.0.4.378.6065" }, { "model": "rt-series routers", "scope": null, "trust": 0.6, "vendor": "asus", "version": null }, { "model": "rt-n56u", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": "3.0.0.376.3715" }, { "model": "rt-n56u", "scope": "eq", "trust": 0.3, "vendor": "asus", "version": "3.0.0.4.376.3715" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "BID", "id": "72390" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "db": "CNNVD", "id": "CNNVD-201502-002" }, { "db": "NVD", "id": "CVE-2014-7269" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:misc:asus_japan_rt-ac56s", "vulnerable": true }, { "cpe22Uri": "cpe:/h:misc:asus_japan_rt-ac68u", "vulnerable": true }, { "cpe22Uri": "cpe:/h:misc:asus_japan_rt-ac87u", "vulnerable": true }, { "cpe22Uri": "cpe:/h:misc:asus_japan_rt-n56u", "vulnerable": true }, { "cpe22Uri": "cpe:/h:misc:asus_japan_rt-n66u", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-000011" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Masashi Sakai", "sources": [ { "db": "BID", "id": "72390" } ], "trust": 0.3 }, "cve": "CVE-2014-7269", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2014-7269", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "Single", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 5.2, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2015-000011", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2015-00880", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-75214", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-7269", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2015-000011", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2015-00880", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201502-002", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-75214", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "VULHUB", "id": "VHN-75214" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "db": "CNNVD", "id": "CNNVD-201502-002" }, { "db": "NVD", "id": "CVE-2014-7269" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. Multiple wireless LAN routers provided by ASUS JAPAN Inc. contain an OS command injection vulnerability. Masashi Sakai reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary OS command may be executed by an authenticated attacker. In addition, when this vulnerability is exploited along with the vulnerability stated in JVN#32631078, an arbitrary OS command may be executed if a logged in user views a malicious page. ASUS RT Series Routers has an unspecified command injection vulnerability because it failed to properly filter user-supplied input. Allows an attacker to execute arbitrary operating system commands in the context of the affected device. A security vulnerability exists in several ASUS routers", "sources": [ { "db": "NVD", "id": "CVE-2014-7269" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "BID", "id": "72390" }, { "db": "VULHUB", "id": "VHN-75214" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-7269", "trust": 3.4 }, { "db": "JVN", "id": "JVN77792759", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2015-000011", "trust": 2.5 }, { "db": "BID", "id": "72390", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-201502-002", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-00880", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-75214", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "VULHUB", "id": "VHN-75214" }, { "db": "BID", "id": "72390" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "db": "CNNVD", "id": "CNNVD-201502-002" }, { "db": "NVD", "id": "CVE-2014-7269" } ] }, "id": "VAR-201502-0454", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "VULHUB", "id": "VHN-75214" } ], "trust": 1.3538392259999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00880" } ] }, "last_update_date": "2024-11-23T22:49:23.820000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Firmware for wireless LAN routers that addressed cross-site request forgery and OS command injection vulnerabilities are available", "trust": 0.8, "url": "http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR" }, { "title": "ASUS RT Series Routers has patches for unspecified command injection vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/54909" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-75214" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "db": "NVD", "id": "CVE-2014-7269" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://jvn.jp/en/jp/jvn77792759/index.html" }, { "trust": 1.7, "url": "http://www.asus.com/jp/news/pnzpd7vkxtrkwxhr" }, { "trust": 1.7, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2015-000011" }, { "trust": 0.8, "url": "//cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7269" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7269" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/72390" }, { "trust": 0.3, "url": "http://www.asus.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "VULHUB", "id": "VHN-75214" }, { "db": "BID", "id": "72390" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "db": "CNNVD", "id": "CNNVD-201502-002" }, { "db": "NVD", "id": "CVE-2014-7269" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-00880" }, { "db": "VULHUB", "id": "VHN-75214" }, { "db": "BID", "id": "72390" }, { "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "db": "CNNVD", "id": "CNNVD-201502-002" }, { "db": "NVD", "id": "CVE-2014-7269" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-03T00:00:00", "db": "CNVD", "id": "CNVD-2015-00880" }, { "date": "2015-02-01T00:00:00", "db": "VULHUB", "id": "VHN-75214" }, { "date": "2015-01-28T00:00:00", "db": "BID", "id": "72390" }, { "date": "2015-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "date": "2015-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-002" }, { "date": "2015-02-01T15:59:01.917000", "db": "NVD", "id": "CVE-2014-7269" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-04T00:00:00", "db": "CNVD", "id": "CNVD-2015-00880" }, { "date": "2015-02-04T00:00:00", "db": "VULHUB", "id": "VHN-75214" }, { "date": "2015-01-28T00:00:00", "db": "BID", "id": "72390" }, { "date": "2015-06-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-000011" }, { "date": "2015-02-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-002" }, { "date": "2024-11-21T02:16:38.947000", "db": "NVD", "id": "CVE-2014-7269" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple ASUS wireless LAN routers vulnerable to OS command injection", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-000011" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-002" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.