First published: Thu Jan 08 2015(Updated: )
common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS TM-AC1900 | =3.0.0.4.376_3169 | |
ASUS WRT firmware | =3.0.0.4.376.2524-g0012f52 | |
ASUS WRT firmware | =3.0.0.4.376_1071 | |
ASUS RT-AC66U firmware | ||
Asus EA-N66 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9583 is classified as a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2014-9583, upgrade the affected ASUS WRT firmware to the latest version provided by the manufacturer that addresses this vulnerability.
Devices such as ASUS RT-AC66U, RT-N66U, and various versions of ASUS WRT firmware are affected by CVE-2014-9583.
Yes, CVE-2014-9583 can be exploited remotely by attackers to bypass authentication and execute arbitrary commands.
CVE-2014-9583 is a command injection vulnerability that allows unauthorized command execution due to improper MAC address validation.