Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service.
References
Link | Resource |
---|---|
https://www.ise.io/casestudies/exploiting-soho-routers/ | Mitigation Third Party Advisory |
https://www.ise.io/soho_service_hacks/ | Third Party Advisory |
https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf | Third Party Advisory |
https://www.ise.io/casestudies/exploiting-soho-routers/ | Mitigation Third Party Advisory |
https://www.ise.io/soho_service_hacks/ | Third Party Advisory |
https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf | Third Party Advisory |
Configurations
History
21 Nov 2024, 01:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.ise.io/casestudies/exploiting-soho-routers/ - Mitigation, Third Party Advisory | |
References | () https://www.ise.io/soho_service_hacks/ - Third Party Advisory | |
References | () https://www.ise.io/wp-content/uploads/2017/07/soho_techreport.pdf - Third Party Advisory |
Information
Published : 2019-11-13 15:15
Updated : 2024-11-21 01:56
NVD link : CVE-2013-4656
Mitre link : CVE-2013-4656
CVE.ORG link : CVE-2013-4656
JSON object : View
Products Affected
asus
- rt-n56u_firmware
- rt-n56u
- rt-ac66u_firmware
- rt-ac66u
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')