First published: Sun Feb 01 2015(Updated: )
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-N66U | <=3.0.0.4.376.3715 | |
Asus EA-N66 | ||
ASUS RT-AC56S | <=3.0.0.4.376.3715 | |
ASUS RT-AC56S | ||
ASUS RT-AC68R | <=3.0.0.4.376.3715 | |
ASUS 4G-AC68U | ||
ASUS RT-AC87U Firmware | <=3.0.0.4.378.3754 | |
ASUS RT-AC87U Firmware | ||
ASUS RT-N56U firmware | <=3.0.0.376.3715 | |
ASUS routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7269 has a medium severity rating due to potential unauthorized access risks.
To fix CVE-2014-7269, update the firmware of affected ASUS routers to the latest version provided by ASUS.
CVE-2014-7269 affects ASUS RT-AC87U, RT-AC68U, RT-AC56S, RT-N66U, and RT-N56U routers with specific firmware versions.
There are no known workarounds for CVE-2014-7269; updating the firmware is the recommended solution.
CVE-2014-7269 represents vulnerabilities that could allow unauthorized access to router configuration settings.