First published: Fri Jul 13 2018(Updated: )
A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rp-ac52 Firmware | <=1.0.1.1s | |
ASUS RP-AC52 | ||
Asus Ea-n66 Firmware | ||
Asus Ea-n66 | ||
Asus Rp-n12 Firmware | ||
Asus Rp-n12 | ||
Asus Rp-n14 Firmware | ||
Asus Rp-n14 | ||
Asus Rp-n53 Firmware | ||
Asus Rp-n53 | ||
Asus Rp-ac56 Firmware | ||
Asus Rp-ac56 | ||
Asus Wmp-n12 Firmware | ||
Asus Wmp-n12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6558 has a severity rating that indicates a high risk of exploitation due to the command injection vulnerability.
To fix CVE-2016-6558, upgrade the firmware of the ASUS RP-AC52 access point to a version later than 1.0.1.1s.
CVE-2016-6558 specifically affects the ASUS RP-AC52 access point running firmware version 1.0.1.1s and potentially earlier versions.
CVE-2016-6558 poses a risk of unauthorized command execution, allowing attackers to execute arbitrary commands on the affected device.
CVE-2016-6558 only affects the ASUS RP-AC52 and does not impact other ASUS devices like the EA-N66 or RP-N12, which are not vulnerable.