{"id": "CVE-2018-9285", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2018-04-04T19:29:00.687", "references": [{"url": "http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html", "source": "cve@mitre.org"}, {"url": "https://fortiguard.com/zeroday/FG-VD-17-216", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in-asus-router.html", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable."}, {"lang": "es", "value": "Main_Analysis_Content.asp en /apply.cgi en dispositivos ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900 y en dispositivos RT-AC3100 en versiones anteriores a la 3.0.0.4.384_10007; dispositivos RT-N18U en versiones anteriores a la 3.0.0.4.382.39935; dispositivos RT-AC87U y RT-AC3200 en versiones anteriores a la 3.0.0.4.382.50010; y dispositivos RT-AC5300 en versiones anteriores a la 3.0.0.4.384.20287 permite la inyecci\u00f3n de comandos del sistema operativo mediante los campos pingCNT y destIP de la variable SystemCmd."}], "lastModified": "2020-11-13T18:15:12.040", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE3C6A2A-0B2A-4B80-BEAA-87AE8E40A7A4", "versionEndExcluding": "3.0.0.4.384.10007"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD6D75D0-EE44-4164-89F0-E04D62E45AA9", "versionEndExcluding": "3.0.0.4.384.10007"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96AD1247-EA76-4E9C-B992-6F3D369F7B33", "versionEndExcluding": "3.0.0.4.384.10007"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91CD50CE-4A9F-420D-A6C6-846790A8B015", "versionEndExcluding": "3.0.0.4.384.10007"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "81008E66-B5E8-4DE5-B14D-E6983C69BC29"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E8E6D66-1D74-42EC-83D7-68D45C4E6CDF", "versionEndExcluding": "3.0.0.4.384.10007"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6E715D86-A7FC-415E-8C13-1ACAF9C49C3A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DA924A6-9525-498B-9803-64149D077B0B", "versionEndExcluding": "3.0.0.4.384.10007"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F2640D39-F0C3-49AA-87D1-F423150FDF2E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2484D33-5279-433B-A61F-EF91F9499DD5", "versionEndExcluding": "3.0.0.4.384.10007"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B9B17C2B-A1EC-4FC1-8AB1-F35D9E3A0AA2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-n18u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "470121E9-650D-4183-B03B-CB58110708C5", "versionEndExcluding": "3.0.0.4.382.39935"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-n18u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FB744DE5-64DB-4EFF-A23C-EE9BB57A36C4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac87u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4A04F3F-8DF0-4D0A-95DB-DA2004BE280E", "versionEndExcluding": "3.0.0.4.382.50010"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac3200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "532AC95B-6B12-48F2-A556-F1729D10D839", "versionEndExcluding": "3.0.0.4.382.50010"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AFE8A3B1-284B-40EC-872E-B8F7103F108C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61D77199-A591-4194-95A1-298572A753B4", "versionEndExcluding": "3.0.0.4.384.20287"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55EE62D6-1E29-4E84-8944-D3D68E212140"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}