CVE-2018-20334

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.
References
Link Resource
https://starlabs.sg/advisories/18-20334/ Exploit Third Party Advisory
https://starlabs.sg/advisories/18-20334/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:asuswrt:3.0.0.4.384.20308:*:*:*:*:*:*:*
OR cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:gt-ac5300:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1200_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1200ge:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac66u-b1:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-acrh12:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-g32:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n10\+d1:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n56r:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n600:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () https://starlabs.sg/advisories/18-20334/ - Exploit, Third Party Advisory () https://starlabs.sg/advisories/18-20334/ - Exploit, Third Party Advisory

Information

Published : 2020-03-20 01:15

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20334

Mitre link : CVE-2018-20334

CVE.ORG link : CVE-2018-20334


JSON object : View

Products Affected

asus

  • rt-ac66u_b1
  • rt-ac87u
  • rt-ac1900p
  • rt-ac86u
  • rt-acrh12
  • rt-n14u
  • rt-ac1200ge
  • rt-ac1750_b1
  • rt-n16
  • rt-n56r
  • rt-n65u
  • rt-n66r
  • rt-g32
  • rt-ac66u-b1
  • rt-ax92u
  • rt-ac1200
  • rt-ac56u
  • rt-ax88u
  • rt-ac1200_v2
  • rt-ac3200
  • rt-ax58u
  • rt-ac1200g
  • rt-ax56u
  • rt-ac66r
  • gt-ax11000
  • rt-ac56s
  • rt-ac68p
  • asuswrt
  • rt-n19
  • rt-ac55u
  • rt-ac66u
  • rt-ac3100
  • rt-ax3000
  • rt-n66u
  • rt-n600
  • gt-ac2900
  • rt-ac51u
  • rt-ac56r
  • rt-acrh13
  • rt-ac88u
  • rt-ac1750
  • rt-n10e
  • rt-ac68u
  • rt-n10\+d1
  • gt-ac5300
  • rt-ac5300
  • rt-n56u
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')