10

CVE-2018-20334

Exploit

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AsusAsuswrt Version3.0.0.4.384.20308
   AsusGt-ac2900 Version-
   AsusGt-ac5300 Version-
   AsusGt-ax11000 Version-
   AsusRt-ac1200 Version-
   AsusRt-ac1200 V2 Version-
   AsusRt-ac1200g Version-
   AsusRt-ac1200ge Version-
   AsusRt-ac1750 Version-
   AsusRt-ac1750 B1 Version-
   AsusRt-ac1900p Version-
   AsusRt-ac3100 Version-
   AsusRt-ac3200 Version-
   AsusRt-ac51u Version-
   AsusRt-ac5300 Version-
   AsusRt-ac55u Version-
   AsusRt-ac56r Version-
   AsusRt-ac56s Version-
   AsusRt-ac56u Version-
   AsusRt-ac66r Version-
   AsusRt-ac66u Version-
   AsusRt-ac66u-b1 Version-
   AsusRt-ac66u B1 Version-
   AsusRt-ac68p Version-
   AsusRt-ac68u Version-
   AsusRt-ac86u Version-
   AsusRt-ac87u Version-
   AsusRt-ac88u Version-
   AsusRt-acrh12 Version-
   AsusRt-acrh13 Version-
   AsusRt-ax3000 Version-
   AsusRt-ax56u Version-
   AsusRt-ax58u Version-
   AsusRt-ax88u Version-
   AsusRt-ax92u Version-
   AsusRt-g32 Version-
   AsusRt-n10+d1 Version-
   AsusRt-n10e Version-
   AsusRt-n14u Version-
   AsusRt-n16 Version-
   AsusRt-n19 Version-
   AsusRt-n56r Version-
   AsusRt-n56u Version-
   AsusRt-n600 Version-
   AsusRt-n65u Version-
   AsusRt-n66r Version-
   AsusRt-n66u Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.7% 0.875
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.