// For flags

CVE-2013-7293

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The ASUS WL-330NUL router has a configuration process that relies on accessing the 192.168.1.1 IP address, but the documentation advises users to instead access a DNS hostname that does not always resolve to 192.168.1.1, which makes it easier for remote attackers to hijack the configuration traffic by controlling the server associated with that hostname.

El router ASUS WL-330NUL tiene un proceso de configuración que se basa en el acceso a la dirección IP 192.168.1.1, pero la documentación recomienda a los usuarios acceder en su lugar por un nombre de host DNS que no siempre se resuelve a 192.168.1.1, lo que hace que sea más fácil para los atacantes remotos secuestrar el tráfico mediante el control de la configuración del servidor asociado con ese nombre de host.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-01-14 CVE Reserved
  • 2014-01-15 CVE Published
  • 2023-11-27 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-16: Configuration
  • CWE-284: Improper Access Control
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Asus
Search vendor "Asus"
Wl-330nul
Search vendor "Asus" for product "Wl-330nul"
--
Affected