First published: Fri Jul 13 2018(Updated: )
A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rp-ac52 Firmware | <=1.0.1.1s | |
ASUS RP-AC52 | ||
Asus Ea-n66 Firmware | ||
Asus Ea-n66 | ||
Asus Rp-n12 Firmware | ||
Asus Rp-n12 | ||
Asus Rp-n14 Firmware | ||
Asus Rp-n14 | ||
Asus Rp-n53 Firmware | ||
Asus Rp-n53 | ||
Asus Rp-ac56 Firmware | ||
Asus Rp-ac56 | ||
Asus Wmp-n12 Firmware | ||
Asus Wmp-n12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.