First published: Wed Apr 04 2018(Updated: )
Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ac66u Firmware | <3.0.0.4.384.10007 | |
ASUS RT-AC66U | ||
ASUS RT-AC68U Firmware | <3.0.0.4.384.10007 | |
ASUS RT-AC68U | ||
Asus Rt-ac86u Firmware | <3.0.0.4.384.10007 | |
ASUS RT-AC86U | ||
Asus Rt-ac88u Firmware | <3.0.0.4.384.10007 | |
Asus Rt-ac88u | ||
Asus Rt-ac1900 Firmware | <3.0.0.4.384.10007 | |
Asus Rt-ac1900 | ||
Asus Rt-ac2900 Firmware | <3.0.0.4.384.10007 | |
Asus Rt-ac2900 | ||
Asus Rt-ac3100 Firmware | <3.0.0.4.384.10007 | |
Asus Rt-ac3100 | ||
Asus Rt-n18u Firmware | <3.0.0.4.382.39935 | |
Asus Rt-n18u | ||
ASUS RT-AC87U Firmware | <3.0.0.4.382.50010 | |
ASUS RT-AC87U | ||
Asus Rt-ac3200 Firmware | <3.0.0.4.382.50010 | |
ASUS RT-AC3200 | ||
Asus Rt-ac5300 Firmware | <3.0.0.4.384.20287 | |
Asus Rt-ac5300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-9285.
The severity of CVE-2018-9285 is critical with a severity value of 9.8.
ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, RT-AC3100, RT-N18U, RT-AC87U, RT-AC3200, and RT-AC5300 devices are affected by CVE-2018-9285.
The recommended version of firmware to fix CVE-2018-9285 is 3.0.0.4.384_10007 for RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices; 3.0.0.4.382.39935 for RT-N18U devices; 3.0.0.4.382.50010 for RT-AC87U and RT-AC3200 devices; and 3.0.0.4.384.20287 for RT-AC5300 devices.
You can find more information about CVE-2018-9285 at the following references: [Reference 1](http://packetstormsecurity.com/files/160049/ASUS-TM-AC1900-Arbitrary-Command-Execution.html), [Reference 2](https://fortiguard.com/zeroday/FG-VD-17-216), [Reference 3](https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerability-in-asus-router.html).