A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/763843 | Third Party Advisory US Government Resource |
https://www.securityfocus.com/bid/93596 | Third Party Advisory VDB Entry |
https://www.kb.cert.org/vuls/id/763843 | Third Party Advisory US Government Resource |
https://www.securityfocus.com/bid/93596 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.kb.cert.org/vuls/id/763843 - Third Party Advisory, US Government Resource | |
References | () https://www.securityfocus.com/bid/93596 - Third Party Advisory, VDB Entry |
Information
Published : 2018-07-13 20:29
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6558
Mitre link : CVE-2016-6558
CVE.ORG link : CVE-2016-6558
JSON object : View
Products Affected
asus
- ea-n66_firmware
- rp-n14_firmware
- rp-ac52
- wmp-n12_firmware
- rp-n14
- rp-ac52_firmware
- rp-n12
- rp-ac56_firmware
- rp-ac56
- rp-n53_firmware
- ea-n66
- rp-n53
- wmp-n12
- rp-n12_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')