Page 3 of 13 results (0.003 seconds)

CVSS: 10.0EPSS: 19%CPEs: 6EXPL: 3

Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp. Múltiples desbordamientos de búfer en web.c de httpd en routers ASUS RT-N56U y RT-AC66U con firmware 3.0.0.4.374_979 permite a atacantes remotos ejecutar código arbitrario a través de parámetros (1) apps_name o (2) apps_flag hacia APP_Installation.asp. • https://www.exploit-db.com/exploits/31033 http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html http://osvdb.org/102267 http://www.exploit-db.com/exploits/31033 http://www.securityfocus.com/bid/65046 https://support.t-mobile.com/docs/DOC-21994 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 51EXPL: 0

Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors. Múltiples vulnerabilidades no especificadas en la característica AiCloud de los ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, y DSL-N55U con firmware anteriores a v3.0.4.372 tienen impacto y vectores de ataque desconocidos. • http://reviews.cnet.com/8301-3132_7-57594003-98 http://twitter.com/ASUSUSA/statuses/357612236392509440 •

CVSS: 3.3EPSS: 0%CPEs: 5EXPL: 0

QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request. QIS_wizard.htm en el router ASUS RT-N56U con firmware antes de v1.0.1.4o permite a atacantes remotodos obtener la contraseña del administrador a través de una petición flag=detect • http://www.kb.cert.org/vuls/id/200814 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •