ASUS ASUSWRT 3.0.0.4.380.7743

CPE Details

ASUS ASUSWRT 3.0.0.4.380.7743
3.0.0.4.380.7743
2020-02-03
14h31 +00:00
2020-02-03
14h31 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:asus:asuswrt:3.0.0.4.380.7743:*:*:*:*:*:*:*

Informations

Vendor

asus

Product

asuswrt

Version

3.0.0.4.380.7743

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-26376 2022-08-05 21h18 +00:00 A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
9.8
Critique
CVE-2017-15654 2018-01-31 19h00 +00:00 Highly predictable session tokens in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allow gaining administrative router access.
8.3
Haute
CVE-2017-15656 2018-01-31 19h00 +00:00 Password are stored in plaintext in nvram in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt.
8.8
Haute
CVE-2018-5999 2018-01-22 19h00 +00:00 An issue was discovered in AsusWRT before 3.0.0.4.384_10007. In the handle_request function in router/httpd/httpd.c, processing of POST requests continues even if authentication fails.
9.8
Critique
CVE-2018-6000 2018-01-22 19h00 +00:00 An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999.
9.8
Critique