CVE-2018-9285

Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:asus:rt-n18u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-n18u:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:asus:rt-ac87u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:asus:rt-ac3200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:15

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html - () http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html -
References () https://fortiguard.com/zeroday/FG-VD-17-216 - Third Party Advisory () https://fortiguard.com/zeroday/FG-VD-17-216 - Third Party Advisory
References () https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in-asus-router.html - Third Party Advisory () https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in-asus-router.html - Third Party Advisory

Information

Published : 2018-04-04 19:29

Updated : 2024-11-21 04:15


NVD link : CVE-2018-9285

Mitre link : CVE-2018-9285

CVE.ORG link : CVE-2018-9285


JSON object : View

Products Affected

asus

  • rt-ac87u
  • rt-ac86u
  • rt-ac5300_firmware
  • rt-ac1900
  • rt-ac2900
  • rt-ac66u_firmware
  • rt-ac3200
  • rt-n18u_firmware
  • rt-ac68u_firmware
  • rt-ac66u
  • rt-ac3100
  • rt-ac88u
  • rt-ac3100_firmware
  • rt-ac3200_firmware
  • rt-n18u
  • rt-ac86u_firmware
  • rt-ac68u
  • rt-ac88u_firmware
  • rt-ac87u_firmware
  • rt-ac5300
  • rt-ac2900_firmware
  • rt-ac1900_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')