Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rt\-Ac86u_firmware
(Asus)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 19 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-09-07 | CVE-2023-38032 | ASUS RT-AC86U AiProtection security- related function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services. | Rt\-Ac86u_firmware | N/A | ||
2023-09-07 | CVE-2023-38033 | ASUS RT-AC86U unused Traffic Analyzer legacy Statistic function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services. | Rt\-Ac86u_firmware | N/A | ||
2023-09-07 | CVE-2023-39236 | ASUS RT-AC86U Traffic Analyzer - Statistic function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services. | Rt\-Ac86u_firmware | N/A | ||
2023-09-07 | CVE-2023-39238 | It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. | Rt\-Ac86u_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_v2_firmware | N/A | ||
2023-09-07 | CVE-2023-39237 | ASUS RT-AC86U Traffic Analyzer - Apps analysis function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services. | Rt\-Ac86u_firmware | N/A | ||
2023-09-07 | CVE-2023-39239 | It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. | Rt\-Ac86u_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_v2_firmware | N/A | ||
2023-09-07 | CVE-2023-39240 | It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. | Rt\-Ac86u_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_v2_firmware | N/A | ||
2018-04-04 | CVE-2018-9285 | Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable. | Rt\-Ac1900_firmware, Rt\-Ac2900_firmware, Rt\-Ac3100_firmware, Rt\-Ac3200_firmware, Rt\-Ac5300_firmware, Rt\-Ac66u_firmware, Rt\-Ac68u_firmware, Rt\-Ac86u_firmware, Rt\-Ac87u_firmware, Rt\-Ac88u_firmware, Rt\-N18u_firmware | 9.8 | ||
2018-04-20 | CVE-2018-8826 | ASUS RT-AC51U, RT-AC58U, RT-AC66U, RT-AC1750, RT-ACRH13, and RT-N12 D1 routers with firmware before 3.0.0.4.380.8228; RT-AC52U B1, RT-AC1200 and RT-N600 routers with firmware before 3.0.0.4.380.10446; RT-AC55U and RT-AC55UHP routers with firmware before 3.0.0.4.382.50276; RT-AC86U and RT-AC2900 routers with firmware before 3.0.0.4.384.20648; and possibly other RT-series routers allow remote attackers to execute arbitrary code via unspecified vectors. | Rt\-Ac1200_firmware, Rt\-Ac1750_firmware, Rt\-Ac2900_firmware, Rt\-Ac51u_firmware, Rt\-Ac52u_b1_firmware, Rt\-Ac55u_firmware, Rt\-Ac55uhp_firmware, Rt\-Ac58u_firmware, Rt\-Ac66u_firmware, Rt\-Ac86u_firmware, Rt\-Acrh13_firmware, Rt\-N12_d1_firmware, Rt\-N600_firmware | 9.8 |