Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2018-20334
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- Critical
- Base Score
- 9.8/10
- Exploit Score
- 3.9/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 5.9/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:asus:asuswrt:3.0.0.4.384.20308:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:gt-ac5300:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac1200_v2:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac1200ge:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac66u-b1:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-acrh12:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-g32:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n10\+d1:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n56r:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n600:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:* |
No
|
- |