10
CVE-2018-20334
- EPSS 3.7%
- Published 20.03.2020 01:15:22
- Last modified 21.11.2024 04:01:15
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.
Data is provided by the National Vulnerability Database (NVD)
Asus ≫ Asuswrt Version3.0.0.4.384.20308
Asus ≫ Gt-ac2900 Version-
Asus ≫ Gt-ac5300 Version-
Asus ≫ Gt-ax11000 Version-
Asus ≫ Rt-ac1200 Version-
Asus ≫ Rt-ac1200 V2 Version-
Asus ≫ Rt-ac1200g Version-
Asus ≫ Rt-ac1200ge Version-
Asus ≫ Rt-ac1750 Version-
Asus ≫ Rt-ac1750 B1 Version-
Asus ≫ Rt-ac1900p Version-
Asus ≫ Rt-ac3100 Version-
Asus ≫ Rt-ac3200 Version-
Asus ≫ Rt-ac51u Version-
Asus ≫ Rt-ac5300 Version-
Asus ≫ Rt-ac55u Version-
Asus ≫ Rt-ac56r Version-
Asus ≫ Rt-ac56s Version-
Asus ≫ Rt-ac56u Version-
Asus ≫ Rt-ac66r Version-
Asus ≫ Rt-ac66u Version-
Asus ≫ Rt-ac66u-b1 Version-
Asus ≫ Rt-ac66u B1 Version-
Asus ≫ Rt-ac68p Version-
Asus ≫ Rt-ac68u Version-
Asus ≫ Rt-ac86u Version-
Asus ≫ Rt-ac87u Version-
Asus ≫ Rt-ac88u Version-
Asus ≫ Rt-acrh12 Version-
Asus ≫ Rt-acrh13 Version-
Asus ≫ Rt-ax3000 Version-
Asus ≫ Rt-ax56u Version-
Asus ≫ Rt-ax58u Version-
Asus ≫ Rt-ax88u Version-
Asus ≫ Rt-ax92u Version-
Asus ≫ Rt-g32 Version-
Asus ≫ Rt-n10+d1 Version-
Asus ≫ Rt-n10e Version-
Asus ≫ Rt-n14u Version-
Asus ≫ Rt-n16 Version-
Asus ≫ Rt-n19 Version-
Asus ≫ Rt-n56r Version-
Asus ≫ Rt-n56u Version-
Asus ≫ Rt-n600 Version-
Asus ≫ Rt-n65u Version-
Asus ≫ Rt-n66r Version-
Asus ≫ Rt-n66u Version-
Asus ≫ Gt-ac5300 Version-
Asus ≫ Gt-ax11000 Version-
Asus ≫ Rt-ac1200 Version-
Asus ≫ Rt-ac1200 V2 Version-
Asus ≫ Rt-ac1200g Version-
Asus ≫ Rt-ac1200ge Version-
Asus ≫ Rt-ac1750 Version-
Asus ≫ Rt-ac1750 B1 Version-
Asus ≫ Rt-ac1900p Version-
Asus ≫ Rt-ac3100 Version-
Asus ≫ Rt-ac3200 Version-
Asus ≫ Rt-ac51u Version-
Asus ≫ Rt-ac5300 Version-
Asus ≫ Rt-ac55u Version-
Asus ≫ Rt-ac56r Version-
Asus ≫ Rt-ac56s Version-
Asus ≫ Rt-ac56u Version-
Asus ≫ Rt-ac66r Version-
Asus ≫ Rt-ac66u Version-
Asus ≫ Rt-ac66u-b1 Version-
Asus ≫ Rt-ac66u B1 Version-
Asus ≫ Rt-ac68p Version-
Asus ≫ Rt-ac68u Version-
Asus ≫ Rt-ac86u Version-
Asus ≫ Rt-ac87u Version-
Asus ≫ Rt-ac88u Version-
Asus ≫ Rt-acrh12 Version-
Asus ≫ Rt-acrh13 Version-
Asus ≫ Rt-ax3000 Version-
Asus ≫ Rt-ax56u Version-
Asus ≫ Rt-ax58u Version-
Asus ≫ Rt-ax88u Version-
Asus ≫ Rt-ax92u Version-
Asus ≫ Rt-g32 Version-
Asus ≫ Rt-n10+d1 Version-
Asus ≫ Rt-n10e Version-
Asus ≫ Rt-n14u Version-
Asus ≫ Rt-n16 Version-
Asus ≫ Rt-n19 Version-
Asus ≫ Rt-n56r Version-
Asus ≫ Rt-n56u Version-
Asus ≫ Rt-n600 Version-
Asus ≫ Rt-n65u Version-
Asus ≫ Rt-n66r Version-
Asus ≫ Rt-n66u Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.7% | 0.875 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.