// For flags

CVE-2018-17127

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

blocking_request.cgi on ASUS GT-AC5300 devices through 3.0.0.4.384_32738 allows remote attackers to cause a denial of service (NULL pointer dereference and device crash) via a request that lacks a timestap parameter.

blocking_request.cgi en dispositivos ASUS GT-AC5300 hasta la versión 3.0.0.4.384_32738 permite que atacantes remotos provoquen una denegación de servicio (desreferencia de puntero NULL y cierre inesperado del dispositivo) mediante una petición que carece de un parámetro timestap.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-09-16 CVE Reserved
  • 2018-09-17 CVE Published
  • 2024-07-27 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Asus
Search vendor "Asus"
Gt-ac5300 Firmware
Search vendor "Asus" for product "Gt-ac5300 Firmware"
<= 3.0.0.4.384.32738
Search vendor "Asus" for product "Gt-ac5300 Firmware" and version " <= 3.0.0.4.384.32738"
-
Affected
in Asus
Search vendor "Asus"
Gt-ac5300
Search vendor "Asus" for product "Gt-ac5300"
--
Safe