Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-6558

Опубликовано: 13 июл. 2018
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:asus:rp-ac52_firmware:*:*:*:*:*:*:*:*
Версия до 1.0.1.1s (включая)
cpe:2.3:h:asus:rp-ac52:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:asus:ea-n66_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:ea-n66:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:asus:rp-n12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-n12:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:asus:rp-n14_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-n14:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:asus:rp-n53_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-n53:-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:asus:rp-ac56_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rp-ac56:-:*:*:*:*:*:*:*
Конфигурация 7

Одновременно

cpe:2.3:o:asus:wmp-n12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:wmp-n12:-:*:*:*:*:*:*:*

EPSS

Процентиль: 88%
0.04035
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-77
CWE-77

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.

EPSS

Процентиль: 88%
0.04035
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-77
CWE-77