Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2018-20334

CVE information

Published

4 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

High

CVSSv3.1 Severity

Critical

Impact Analysis

Description

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell..

CVSSv2.0 Score

Severity
High
Base Score
10/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

CVSSv3.1 Score

Severity
Critical
Base Score
9.8/10
Exploit Score
3.9/10
Access Vector
Network
Access Complexity
Low
Privileges Required
None
Impact Score
5.9/10
Confidentiality Impact
High
Availability Impact
High
Integrity Impact
High
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:asus:asuswrt:3.0.0.4.384.20308:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:gt-ac5300:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac1200_v2:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac1200ge:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac66u-b1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-acrh12:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-g32:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n10\+d1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n56r:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n600:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*
  No
-