12 results (0.008 seconds)

CVSS: 9.0EPSS: 0%CPEs: 188EXPL: 1

ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device. ASUS RT-A88U versión 3.0.0.4.386_45898 es vulnerable a un ataque de tipo Cross Site Scripting (XSS). El panel de administración del enrutador ASUS no desinfecta los registros de WiFI correctamente, si un atacante pudiera cambiar el SSID del enrutador con una carga útil personalizada, podría obtener XSS almacenado en el dispositivo • https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 65%CPEs: 2EXPL: 4

System command injection in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to execute system commands via the "load_script" URL parameter. La inyección de comandos de sistema en appGet.cgi en ASUS RT-AC3200 versión 3.0.0.4.382.50010, permite a atacantes ejecutar comandos del sistema mediante el parámetro de URL "load_script". • https://github.com/BTtea/CVE-2018-14714-RCE_exploit https://github.com/tin-z/CVE-2018-14714-POC https://github.com/sunn1day/CVE-2018-14714-POC https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 1

Format string vulnerability in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to read arbitrary sections of memory and CPU registers via the "hook" URL parameter. La vulnerabilidad de cadena de formato en appGet.cgi en ASUS RT-AC3200 versión 3.0.0.4.382.50010, permite a los atacantes leer secciones arbitrarias de memoria y registros de la CPU mediante el parámetro URL "hook". • https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to inject system commands via the "hook" URL parameter. Una vulnerabilidad de desbordamiento de búfer en appGet.cgi en ASUS RT-AC3200 versión 3.0.0.4.382.50010, permite a los atacantes inyectar comandos del sistema por medio del parámetro de URL "hook". • https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

Missing cross-site request forgery protection in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to cause state-changing actions with specially crafted URLs. Una vulnerabilidad en la falta la protección para cross-site request forgery en appGet.cgi en ASUS RT-AC3200 versión 3.0.0.4.382.50010, permite a los atacantes generar acciones de cambio de estado con URL especialmente creadas. • https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 • CWE-352: Cross-Site Request Forgery (CSRF) •