// For flags

CVE-2014-9583

ASUSWRT 3.0.0.4.376_1071 - LAN Backdoor Command Execution

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

6
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.

common.c en infosvr en ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, y otras versiones, utilizado en RT-AC66U, RT-N66U, y otros routers, no comprueba correctamente la dirección MAC para una solicitud, lo que permite a atacantes remotos evadir la autenticación y ejecutar comandos arbitrarios a través de un paquete NET_CMD_ID_MANU_CMD en el puerto UDP 9999. NOTA: este problema fue mapeado incorrectamente a CVE-2014-10000, pero este identificador es inválido debido a su uso como ejemplo de cambio de la sintaxis de identificadores de CVEs del 2014.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-01-04 First Exploit
  • 2015-01-08 CVE Reserved
  • 2015-01-08 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-04-11 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Asus
Search vendor "Asus"
Wrt Firmware
Search vendor "Asus" for product "Wrt Firmware"
3.0.0.4.376.2524-g0012f52
Search vendor "Asus" for product "Wrt Firmware" and version "3.0.0.4.376.2524-g0012f52"
-
Affected
in Asus
Search vendor "Asus"
Rt-ac66u
Search vendor "Asus" for product "Rt-ac66u"
*-
Safe
Asus
Search vendor "Asus"
Wrt Firmware
Search vendor "Asus" for product "Wrt Firmware"
3.0.0.4.376.2524-g0012f52
Search vendor "Asus" for product "Wrt Firmware" and version "3.0.0.4.376.2524-g0012f52"
-
Affected
in Asus
Search vendor "Asus"
Rt-n66u
Search vendor "Asus" for product "Rt-n66u"
*-
Safe
Asus
Search vendor "Asus"
Wrt Firmware
Search vendor "Asus" for product "Wrt Firmware"
3.0.0.4.376_1071
Search vendor "Asus" for product "Wrt Firmware" and version "3.0.0.4.376_1071"
-
Affected
in Asus
Search vendor "Asus"
Rt-ac66u
Search vendor "Asus" for product "Rt-ac66u"
*-
Safe
Asus
Search vendor "Asus"
Wrt Firmware
Search vendor "Asus" for product "Wrt Firmware"
3.0.0.4.376_1071
Search vendor "Asus" for product "Wrt Firmware" and version "3.0.0.4.376_1071"
-
Affected
in Asus
Search vendor "Asus"
Rt-n66u
Search vendor "Asus" for product "Rt-n66u"
*-
Safe
T-mobile
Search vendor "T-mobile"
Tm-ac1900
Search vendor "T-mobile" for product "Tm-ac1900"
3.0.0.4.376_3169
Search vendor "T-mobile" for product "Tm-ac1900" and version "3.0.0.4.376_3169"
-
Affected