First published: Mon Jan 22 2018(Updated: )
An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus asuswrt | <3.0.0.4.384_10007 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-6000 is critical with a CVSS score of 9.8.
CVE-2018-6000 allows attackers to set the admin password and launch an SSH daemon, posing a serious security risk.
CVE-2018-6000 affects AsusWRT versions up to 3.0.0.4.384_10007, allowing attackers to exploit the vulnerability.
Using CVE-2018-6000, attackers can set the admin password and launch an SSH daemon, potentially gaining unauthorized access to the device.
To fix CVE-2018-6000, update AsusWRT to version 3.0.0.4.384_10007 or later, which includes a patch for the vulnerability.