First published: Fri Jul 13 2018(Updated: )
In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus RP-AC52 Firmware | <=1.0.1.1s | |
Asus RP-AC52 Firmware | ||
Asus EA-N66 | ||
E-annu | ||
Asus WMP-N12 | ||
Asus RP-N12 Firmware | ||
Asus RP-N14 | ||
Asus RP-N14 | ||
Asus Rp-n53 | ||
Asus Rp-n53 Firmware | ||
Asus RP-AC56 | ||
Asus RP-AC56 | ||
Asus WMP-N12 | ||
Asus WMP-N12 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6557 is classified as a high severity vulnerability due to potential unauthorized actions by attackers.
To fix CVE-2016-6557, update the ASUS RP-AC52 access point firmware to a version later than 1.0.1.1s.
CVE-2016-6557 affects the ASUS RP-AC52 access point specifically with firmware version 1.0.1.1s and possibly earlier versions.
CVE-2016-6557 can enable attackers to perform unauthorized actions with the same permissions as legitimate users.
There are no specific workarounds for CVE-2016-6557; updating the firmware is the recommended action.