First published: Wed Jan 09 2019(Updated: )
Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier, allow an administrative user to embed arbitrary scripts to the configuration data through a certain form field of the configuration page, which may be executed on another administrative user's web browser. This is a different vulnerability from CVE-2018-0666.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Yamaha Rt57i Firmware | <=rev.8.00.95 | |
Yamaha Rt57i | ||
Yamaha Rt58i Firmware | <=rev.9.01.51 | |
Yamaha Rt58i | ||
Yamaha Nvr500 Firmware | <=rev.11.00.36 | |
Yamaha Nvr500 | ||
Yamaha Rtx810 Firmware | <=rev.11.01.31 | |
Yamaha Rtx810 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0665 is medium with a CVSS score of 6.8.
An administrative user can embed arbitrary scripts to the configuration data through a certain form field of the configuration page.
Yamaha routers RT57i Rev.8.00.95 and earlier, RT58i Rev.9.01.51 and earlier, NVR500 Rev.11.00.36 and earlier, RTX810 Rev.11.01.31 and earlier are affected by CVE-2018-0665.
For more information about CVE-2018-0665, you can refer to the following links: http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN69967692.html, https://flets-w.com/solution/kiki_info/info/180829.html, https://jvn.jp/en/jp/JVN69967692/index.html.
To fix CVE-2018-0665 in Yamaha routers, it is recommended to update the firmware to the latest version provided by Yamaha.