9.8
CVE-2018-8826
- EPSS 5.83%
- Published 20.04.2018 20:29:00
- Last modified 21.11.2024 04:14:23
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
ASUS RT-AC51U, RT-AC58U, RT-AC66U, RT-AC1750, RT-ACRH13, and RT-N12 D1 routers with firmware before 3.0.0.4.380.8228; RT-AC52U B1, RT-AC1200 and RT-N600 routers with firmware before 3.0.0.4.380.10446; RT-AC55U and RT-AC55UHP routers with firmware before 3.0.0.4.382.50276; RT-AC86U and RT-AC2900 routers with firmware before 3.0.0.4.384.20648; and possibly other RT-series routers allow remote attackers to execute arbitrary code via unspecified vectors.
Data is provided by the National Vulnerability Database (NVD)
Asus ≫ Rt-ac51u Firmware Version3.0.0.4.380.8228
Asus ≫ Rt-ac58u Firmware Version3.0.0.4.380.8228
Asus ≫ Rt-ac66u Firmware Version3.0.0.4.380.8228
Asus ≫ Rt-ac1750 Firmware Version3.0.0.4.380.8228
Asus ≫ Rt-n12 D1 Firmware Version3.0.0.4.380.8228
Asus ≫ Rt-ac52u B1 Firmware Version3.0.0.4.380.10446
Asus ≫ Rt-ac1200 Firmware Version3.0.0.4.380.10446
Asus ≫ Rt-n600 Firmware Version3.0.0.4.380.10446
Asus ≫ Rt-ac55u Firmware Version3.0.0.4.382.50276
Asus ≫ Rt-ac55uhp Firmware Version3.0.0.4.382.50276
Asus ≫ Rt-ac86u Firmware Version3.0.0.4.384.20648
Asus ≫ Rt-acrh13 Firmware Version3.0.0.4.380.8228
Asus ≫ Rt-ac2900 Firmware Version3.0.0.4.384.20648
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 5.83% | 0.895 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.