Vulnerabilities (CVE)

Filtered by vendor Asustor Subscribe
Filtered by product As6202t
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-11346 1 Asustor 2 As6202t, As6202t Firmware 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
An insecure direct object reference vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows the ability to reference the "download_sys_settings" action and then specify files arbitrarily throughout the system via the act parameter.
CVE-2018-11345 1 Asustor 2 As6202t, As6202t Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system.
CVE-2018-11344 1 Asustor 2 As6202t, As6202t Firmware 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
A path traversal vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a file on the system to download via the file1 parameter.
CVE-2018-11342 1 Asustor 2 As6202t, As6202t Firmware 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A path traversal vulnerability in fileExplorer.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a path to a file on the system to create folders via the dest_folder parameter.
CVE-2018-11341 1 Asustor 2 As6202t, As6202t Firmware 2024-11-21 6.5 MEDIUM 7.2 HIGH
Directory traversal in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to navigate the file system via the filename parameter.
CVE-2018-11340 1 Asustor 2 As6202t, As6202t Firmware 2024-11-21 9.0 HIGH 7.2 HIGH
An unrestricted file upload vulnerability in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data to a specified filename. This can be used to place attacker controlled code on the file system that is then executed.