Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rt\-N56u_firmware
(Asus)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 9 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-01-28 | CVE-2013-3093 | ASUS RT-N56U devices allow CSRF. | Dsl\-N55u_firmware, Rt\-Ac66u_firmware, Rt\-N10u_firmware, Rt\-N15u_firmware, Rt\-N16_firmware, Rt\-N53_firmware, Rt\-N56u_firmware | N/A | ||
2019-11-13 | CVE-2013-4656 | Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service. | Rt\-Ac66u_firmware, Rt\-N56u_firmware | N/A | ||
2017-01-30 | CVE-2017-5632 | An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an "nmap -O" command that specifies an IP address of an affected device, one can crash the device's WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network. | Rt\-N56u_firmware | 6.5 | ||
2015-02-01 | CVE-2014-7270 | Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users. | Rt\-Ac56s, Rt\-Ac56s_firmware, Rt\-Ac68u, Rt\-Ac68u_firmware, Rt\-Ac87u, Rt\-Ac87u_firmware, Rt\-N56u, Rt\-N56u_firmware, Rt\-N66u, Rt\-N66u_firmware | N/A | ||
2015-02-01 | CVE-2014-7269 | ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allow remote authenticated users to execute arbitrary OS commands via unspecified vectors. | Rt\-Ac56s, Rt\-Ac56s_firmware, Rt\-Ac68u, Rt\-Ac68u_firmware, Rt\-Ac87u, Rt\-Ac87u_firmware, Rt\-N56u, Rt\-N56u_firmware, Rt\-N66u, Rt\-N66u_firmware | N/A | ||
2014-04-22 | CVE-2014-2719 | Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code. | Rt\-Ac66u_firmware, Rt\-Ac68u, Rt\-Ac68u_firmware, Rt\-N10e_firmware, Rt\-N14u_firmware, Rt\-N16_firmware, Rt\-N56u_firmware, Rt\-N65u_firmware, Rt\-N66u_firmware, Tm\-Ac1900 | N/A | ||
2014-01-22 | CVE-2013-6343 | Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware 3.0.0.4.374_979 allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp. | Rt\-Ac66u_firmware, Rt\-N56u_firmware, Tm\-Ac1900_firmware | N/A | ||
2013-07-26 | CVE-2013-4937 | Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors. | Dsl\-N55u, Dsl\-N56u_firmware, Rt\-Ac66u, Rt\-Ac66u_firmware, Rt\-N14u, Rt\-N14u_firmware, Rt\-N16, Rt\-N16_firmware, Rt\-N56u, Rt\-N56u_firmware, Rt\-N65u, Rt\-N65u_firmware, Rt\-N66u, Rt\-N66u_firmware | N/A | ||
2011-11-21 | CVE-2011-4497 | QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request. | Rt\-N56u, Rt\-N56u_firmware | N/A |