ASUS RT-AC66U Router Firmware 3.0.0.4.140

CPE Details

ASUS RT-AC66U Router Firmware 3.0.0.4.140
3.0.0.4.140
2013-07-26
11h01 +00:00
2013-07-31
23h30 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*

Informations

Vendor

asus

Product

rt-ac66u_firmware

Version

3.0.0.4.140

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2018-8879 2019-11-21 14h26 +00:00 Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
9.8
Critical
CVE-2018-9285 2018-04-04 17h00 +00:00 Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.
9.8
Critical
CVE-2014-2719 2014-04-21 12h00 +00:00 Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
6.3
CVE-2013-4937 2013-07-26 10h00 +00:00 Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
10