First published: Mon Aug 27 2018(Updated: )
Main_Analysis_Content.asp in ASUS DSL-N12E_C1 1.1.2.3_345 is prone to Authenticated Remote Command Execution, which allows a remote attacker to execute arbitrary OS commands via service parameters, such as shell metacharacters in the destIP parameter of a cmdMethod=ping request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Dsl-n12e C1 Firmware | =1.1.2.3_345 | |
Asus Dsl-n12e C1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15887 is a vulnerability in ASUS DSL-N12E_C1 1.1.2.3_345 that allows authenticated remote command execution.
CVE-2018-15887 has a severity rating of 8.8 (high).
ASUS DSL-N12E_C1 1.1.2.3_345 firmware is affected by CVE-2018-15887.
An attacker can exploit CVE-2018-15887 by executing arbitrary OS commands using service parameters, such as shell metacharacters in the destIP parameter of a cmdMethod=ping request.
Yes, ASUS DSL-N12E_C1 with 1.1.2.3_345 firmware is vulnerable to CVE-2018-15887.