CVE-2014-7269

ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asus:rt-ac56s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:asus:rt-ac87u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:16

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN77792759/index.html - Vendor Advisory () http://jvn.jp/en/jp/JVN77792759/index.html - Vendor Advisory
References () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011 - Vendor Advisory () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000011 - Vendor Advisory
References () http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR - Patch, Vendor Advisory () http://www.asus.com/jp/News/PNzPd7vkXtrKWXHR - Patch, Vendor Advisory

Information

Published : 2015-02-01 15:59

Updated : 2024-11-21 02:16


NVD link : CVE-2014-7269

Mitre link : CVE-2014-7269

CVE.ORG link : CVE-2014-7269


JSON object : View

Products Affected

asus

  • rt-n66u
  • rt-ac56s_firmware
  • rt-ac68u
  • rt-n56u_firmware
  • rt-ac68u_firmware
  • rt-ac56s
  • rt-n66u_firmware
  • rt-n56u
  • rt-ac87u
  • rt-ac87u_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')