2 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Asus RT-N12E 2.0.0.39 is affected by an incorrect access control vulnerability. Through system.asp / start_apply.htm, an attacker can change the administrator password without any authentication. Asus RT-N12E versión 2.0.0.39, está afectado por una vulnerabilidad de control de acceso incorrecto. Mediante el archivo system.asp / start_apply.htm, un atacante puede cambiar la contraseña del administrador sin ninguna autenticación • https://gist.github.com/ninj4c0d3r/574d2753d469e4ba51dfe555d9c2d4fb https://www.asus.com/Networking/RTN12E/HelpDesk_BIOS https://www.shodan.io/search?query=rt-n12e • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.0EPSS: 0%CPEs: 188EXPL: 1

ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device. ASUS RT-A88U versión 3.0.0.4.386_45898 es vulnerable a un ataque de tipo Cross Site Scripting (XSS). El panel de administración del enrutador ASUS no desinfecta los registros de WiFI correctamente, si un atacante pudiera cambiar el SSID del enrutador con una carga útil personalizada, podría obtener XSS almacenado en el dispositivo • https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •