Page 26 of 265 results (0.012 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 2

ASUS RT-AX86U router firmware below version under 9.0.0.4_386 has a buffer overflow in the blocking_request.cgi function of the httpd module that can cause code execution when an attacker constructs malicious data. El firmware del enrutador ASUS RT-AX86U versiones por debajo de 9.0.0.4_386, presenta un desbordamiento del búfer en la función block_request.cgi del módulo httpd que puede causar una ejecución de código cuando un atacante construye datos maliciosos • https://github.com/sunn1day/CVE-2020-36109-POC https://github.com/tin-z/CVE-2020-36109-POC https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 3

An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real update, resulting in a persistent outage of those services. Se detectó un problema en los dispositivos ASUS DSL-N14U-B1 versión 1.1.2.3_805. Un atacante puede cargar contenido de archivo arbitrario como una actualización de firmware cuando el nombre de archivo Settings_DSL-N14U-B1.trx es usado. • https://github.com/kaisersource/CVE-2021-3166 https://github.com/kaisersource/kaisersource.github.io/blob/main/_posts/2021-01-17-dsl-n14u.md https://kaisersource.github.io/dsl-n14u • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

The ASUS DSL-N17U modem with firmware 1.1.0.2 allows attackers to access the admin interface by changing the admin password without authentication via a POST request to Advanced_System_Content.asp with the uiViewTools_username=admin&uiViewTools_Password= and uiViewTools_PasswordConfirm= substrings. El módem ASUS DSL-N17U con versiones de firmware 1.1.0.2, permite a atacantes acceder a la interfaz de administración al cambiar la contraseña de administrador sin autenticación por medio de una petición POST para el archivo Advanced_System_Content.asp con las subcadenas uiViewTools_username=admin&uiViewTools_Password= y uiViewTools_PasswordConfirm=. • https://securityforeveryone.com/blog/asus-dsl-n17u-model-cve-2020-35219 https://www.asus.com/Networking-IoT-Servers/Modem-LTE-Routers/All-series/DSL-N16/HelpDesk_BIOS • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection. Se presenta una vulnerabilidad de inyección en RT-AC88U Download Master versiones anteriores a 3.1.0.108. • https://vuldb.com/?id.165678 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit." Se presenta una vulnerabilidad de divulgación de información en RT-AC88U Download Master versiones anteriores a 3.1.0.108. Un acceso directo a /downloadmaster/dm_apply.cgi? • https://vuldb.com/?id.165677 • CWE-425: Direct Request ('Forced Browsing') •