890
VMScore

CVE-2018-9285

Published: 04/04/2018 Updated: 13/11/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices prior to 3.0.0.4.384_10007; RT-N18U devices prior to 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices prior to 3.0.0.4.382.50010; and RT-AC5300 devices prior to 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

asus rt-ac66u_firmware

asus rt-ac68u_firmware

asus rt-ac86u_firmware

asus rt-ac88u_firmware

asus rt-ac1900_firmware

asus rt-ac2900_firmware

asus rt-ac3100_firmware

asus rt-n18u_firmware

asus rt-ac87u_firmware

asus rt-ac3200_firmware

asus rt-ac5300_firmware

Exploits

This Metasploit module exploits a code execution vulnerability within the ASUS TM-AC1900 router as an authenticated user The vulnerability is due to a failure filter out percent encoded newline characters within the HTTP argument SystemCmd when invoking /applycgi which bypasses the patch for CVE-2018-9285 ...