Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-11346 | 1 Asustor | 2 As6202t, As6202t Firmware | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
An insecure direct object reference vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows the ability to reference the "download_sys_settings" action and then specify files arbitrarily throughout the system via the act parameter. | |||||
CVE-2018-11345 | 1 Asustor | 2 As6202t, As6202t Firmware | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system. | |||||
CVE-2018-11344 | 1 Asustor | 2 As6202t, As6202t Firmware | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
A path traversal vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a file on the system to download via the file1 parameter. | |||||
CVE-2018-11342 | 1 Asustor | 2 As6202t, As6202t Firmware | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
A path traversal vulnerability in fileExplorer.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a path to a file on the system to create folders via the dest_folder parameter. | |||||
CVE-2018-11341 | 1 Asustor | 2 As6202t, As6202t Firmware | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
Directory traversal in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to navigate the file system via the filename parameter. | |||||
CVE-2018-11340 | 1 Asustor | 2 As6202t, As6202t Firmware | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
An unrestricted file upload vulnerability in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data to a specified filename. This can be used to place attacker controlled code on the file system that is then executed. |