Page 47 of 265 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

ASUS RT-AC* and RT-N* devices with firmware before 3.0.0.4.380.7378 allow JSONP Information Disclosure such as a network map. Los dispositivos ASUS RT-AC* y RT-N* con firmware anterior a la versión 3.0.0.4.380.7378, permiten la divulgación de información JSONP, como un mapa de red. ASUS routers suffer from cross site request forgery and information disclosure vulnerabilities. Versions affected include RT-AC55U, RT-AC56R, RT-AC56S, RT-AC56U, RT-AC66U, RT-AC88U, RT-AC66R, RT-AC66U, RT-AC66W, RT-AC68W, RT-AC68P, RT-AC68R, RT-AC68U, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC53U, RT-AC1900P, RT-AC3100, RT-AC3200, RT-AC5300, RT-N11P, RT-N12 (D1 version only), RT-N12+, RT-N12E, RT-N18U, RT-N56U, RT-N66R, RT-N66U (B1 version only), and RT-N66W. • https://www.asus.com/support/Download/11/2/0/161/45 https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

ASUS RT-AC* and RT-N* devices with firmware before 3.0.0.4.380.7378 have Login Page CSRF and Save Settings CSRF. Los dispositivos ASUS RT-AC * y RT-N * con firmware anterior a la versión 3.0.0.4.380.7378 tienen una vulneravilidad tipo CSRF en la página de incicio de sesión y de guardado de la configuración. ASUS routers suffer from cross site request forgery and information disclosure vulnerabilities. Versions affected include RT-AC55U, RT-AC56R, RT-AC56S, RT-AC56U, RT-AC66U, RT-AC88U, RT-AC66R, RT-AC66U, RT-AC66W, RT-AC68W, RT-AC68P, RT-AC68R, RT-AC68U, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC53U, RT-AC1900P, RT-AC3100, RT-AC3200, RT-AC5300, RT-N11P, RT-N12 (D1 version only), RT-N12+, RT-N12E, RT-N18U, RT-N56U, RT-N66R, RT-N66U (B1 version only), and RT-N66W. • https://www.asus.com/support/Download/11/2/0/161/45 https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 14%CPEs: 2EXPL: 2

Buffer overflows in networkmap on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488; and Asuswrt-Merlin firmware before 380.65_2 allow remote attackers to execute arbitrary code on the router via a long host or port in crafted multicast messages. Desbordamiento de búfer en networkmap en routers ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300 y RT-AC750 con firmware en versiones anteriores a 3.0.0.4.380.7378; routers RT-AC68W con firmware en versiones anteriores a 3.0.0.4.380.7266 y routers RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1 y RT-N12+ Pro con firmware en versiones anteriores a 3.0.0.4.380.9488 y Asuswrt-Merlin firmware en versiones anteriores a 380.65_2 permite a atacantes remotos ejecutar código arbitrario en el router a través de un host o puerto largo en mensajes de multidifusión manipulados. • https://www.exploit-db.com/exploits/41573 http://www.securityfocus.com/bid/96938 https://asuswrt.lostrealm.ca/changelog https://bierbaumer.net/security/asuswrt/#remote-code-execution • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 50%CPEs: 2EXPL: 2

Session hijack vulnerability in httpd on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488; and Asuswrt-Merlin firmware before 380.65_2 allows remote attackers to steal any active admin session by sending cgi_logout and asusrouter-Windows-IFTTT-1.0 in certain HTTP headers. Vulnerabilidad de secuestro de sesión en httpd en routers ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300 y RT-AC750 con firmware en versiones anteriores a 3.0.0.4.380.7378; routers RT-AC68W con firmware en versiones anteriores a 3.0.0.4.380.7266 y routers RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1 y RT-N12+ Pro con firmware en versiones anteriores a 3.0.0.4.380.9488 y Asuswrt-Merlin firmware en versiones anteriores a 380.65_2 permite a atacantes remotos robar cualquier sesión de administrador activa enviando cgi_logout y asusrouter-Windows-IFTTT-1.0 en ciertos encabezados HTTP. • https://www.exploit-db.com/exploits/41572 http://www.securityfocus.com/bid/96938 https://asuswrt.lostrealm.ca/changelog https://bierbaumer.net/security/asuswrt/#session-stealing • CWE-287: Improper Authentication •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 2

Cross-site scripting (XSS) vulnerability in httpd on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488 allows remote attackers to inject arbitrary JavaScript by requesting filenames longer than 50 characters. Vulnerabilidad XSS en httpd en routers ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300 y RT-AC750 con firmware en versiones anteriores a 3.0.0.4.380.7378; routers RT-AC68W con firmware en versiones anteriores a 3.0.0.4.380.7266 y routers RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1 y RT-N12+ Pro con firmware en versiones anteriores a 3.0.0.4.380.9488 permiten a atacantes remotos inyectar JavaScript arbitrario solicitando nombres de archivo de más de 50 caracteres. • https://www.exploit-db.com/exploits/41571 http://www.securityfocus.com/bid/96938 https://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •