CVE-2016-6558

A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.
References
Link Resource
https://www.kb.cert.org/vuls/id/763843 Third Party Advisory US Government Resource
https://www.securityfocus.com/bid/93596 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rp-ac52_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-ac52:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asus:ea-n66_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:ea-n66:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:asus:rp-n12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-n12:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:asus:rp-n14_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-n14:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:asus:rp-n53_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-n53:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:asus:rp-ac56_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-ac56:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:asus:wmp-n12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:wmp-n12:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-13 20:29

Updated : 2024-02-28 16:48


NVD link : CVE-2016-6558

Mitre link : CVE-2016-6558

CVE.ORG link : CVE-2016-6558


JSON object : View

Products Affected

asus

  • wmp-n12
  • rp-n14_firmware
  • rp-ac56_firmware
  • ea-n66
  • rp-n12
  • rp-ac52_firmware
  • rp-n53
  • rp-n14
  • rp-ac56
  • wmp-n12_firmware
  • rp-ac52
  • rp-n12_firmware
  • ea-n66_firmware
  • rp-n53_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')