6.8
CVSSv2

CVE-2017-5891

Published: 10/05/2017 Updated: 16/05/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

ASUS RT-AC* and RT-N* devices with firmware prior to 3.0.0.4.380.7378 have Login Page CSRF and Save Settings CSRF.

Vulnerable Product Search on Vulmon Subscribe to Product

asus rt-ac1750_firmware 3.0.0.4.380.7266

Exploits

ASUS routers suffer from cross site request forgery and information disclosure vulnerabilities Versions affected include RT-AC55U, RT-AC56R, RT-AC56S, RT-AC56U, RT-AC66U, RT-AC88U, RT-AC66R, RT-AC66U, RT-AC66W, RT-AC68W, RT-AC68P, RT-AC68R, RT-AC68U, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC53U, RT-AC1900P, RT-AC3100, RT-AC3200, RT-AC5300, RT-N11P, RT-N ...

Recent Articles

Attention, Asus RT wireless router owners: Patch your gear now to squash web hijack bugs
The Register • Richard Chirgwin • 11 May 2017

Buggy admin interface – where have we heard that before?

Asus RT wireless routers have joined the SOHOpeless list – with poor cross-site request forgery protection affecting 30 variants of the devices. The design blunders, labeled CVE-2017-5891, hit RT-AC and RT-N variants using firmware older than version 3.0.0.4.380.7378. The lack of CSRF protection means that if the user has left the default credentials – admin:admin – in place, or if an attacker knows the admin password, a malicious webpage can log into the router when visited by the victim....