First published: Wed Jan 22 2014(Updated: )
Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS TM-AC1900 Firmware | =3.0.0.4..374_979 | |
ASUS TM-1900 | ||
ASUS RT-N56U firmware | =3.0.0.4..374_979 | |
ASUS routers | ||
ASUS RT-AC66U Firmware | =3.0.0.4..374_979 | |
ASUS RT-AC66U firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6343 is classified as a high severity vulnerability due to its ability to allow remote code execution on affected ASUS routers.
To fix CVE-2013-6343, upgrade the firmware of your ASUS RT-N56U or RT-AC66U router to a version that is not vulnerable to this issue.
CVE-2013-6343 affects ASUS RT-N56U and RT-AC66U routers running firmware version 3.0.0.4.374_979.
The potential impacts of CVE-2013-6343 include unauthorized remote access and execution of arbitrary code on vulnerable routers.
Yes, CVE-2013-6343 can be exploited remotely by attackers without physical access to the vulnerable router.