Product:

Rt\-Ac68u_firmware

(Asus)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 14
Date Id Summary Products Score Patch Annotated
2023-02-03 CVE-2021-37315 Incorrect Access Control issue discoverd in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the source for COPY and MOVE operations. Rt\-Ac68u_firmware 9.1
2023-02-03 CVE-2021-37316 SQL injection vulnerability in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to view sensitive information via /etc/shadow. Rt\-Ac68u_firmware 7.5
2023-02-03 CVE-2021-37317 Directory Traversal vulnerability in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the target for COPY and MOVE operations. Rt\-Ac68u_firmware 9.1
2018-04-04 CVE-2018-9285 Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable. Rt\-Ac1900_firmware, Rt\-Ac2900_firmware, Rt\-Ac3100_firmware, Rt\-Ac3200_firmware, Rt\-Ac5300_firmware, Rt\-Ac66u_firmware, Rt\-Ac68u_firmware, Rt\-Ac86u_firmware, Rt\-Ac87u_firmware, Rt\-Ac88u_firmware, Rt\-N18u_firmware 9.8
2018-05-14 CVE-2018-0582 Cross-site scripting vulnerability in ASUS RT-AC68U Firmware version prior to 3.0.0.4.380.1031 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Rt\-Ac68u_firmware 6.1
2015-02-01 CVE-2014-7270 Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users. Rt\-Ac56s, Rt\-Ac56s_firmware, Rt\-Ac68u, Rt\-Ac68u_firmware, Rt\-Ac87u, Rt\-Ac87u_firmware, Rt\-N56u, Rt\-N56u_firmware, Rt\-N66u, Rt\-N66u_firmware N/A
2015-02-01 CVE-2014-7269 ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. Rt\-Ac56s, Rt\-Ac56s_firmware, Rt\-Ac68u, Rt\-Ac68u_firmware, Rt\-Ac87u, Rt\-Ac87u_firmware, Rt\-N56u, Rt\-N56u_firmware, Rt\-N66u, Rt\-N66u_firmware N/A
2014-04-22 CVE-2014-2925 Cross-site scripting (XSS) vulnerability in Advanced_Wireless_Content.asp in ASUS RT-AC68U and other RT series routers with firmware before 3.0.0.4.374.5047 allows remote attackers to inject arbitrary web script or HTML via the current_page parameter to apply.cgi. Rt\-Ac68u, Rt\-Ac68u_firmware, Tm\-Ac1900 N/A
2014-04-22 CVE-2014-2719 Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code. Rt\-Ac66u_firmware, Rt\-Ac68u, Rt\-Ac68u_firmware, Rt\-N10e_firmware, Rt\-N14u_firmware, Rt\-N16_firmware, Rt\-N56u_firmware, Rt\-N65u_firmware, Rt\-N66u_firmware, Tm\-Ac1900 N/A
2014-04-22 CVE-2013-5948 The Network Analysis tab (Main_Analysis_Content.asp) in the ASUS RT-AC68U and other RT series routers with firmware before 3.0.0.4.374.5047 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the Target field (destIP parameter). Rt\-Ac68u, Rt\-Ac68u_firmware, Tm\-Ac1900 N/A