Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown

CVE-2021-37317

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
Directory Traversal vulnerability in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the target for COPY and MOVE operations.
Attacker Value
Unknown

CVE-2021-37316

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
SQL injection vulnerability in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to view sensitive information via /etc/shadow.
Attacker Value
Unknown

CVE-2021-37315

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
Incorrect Access Control issue discoverd in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the source for COPY and MOVE operations.
Attacker Value
Unknown

CVE-2021-43702

Disclosure Date: July 05, 2022 (last updated October 07, 2023)
ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device.
Attacker Value
Unknown

CVE-2021-45757

Disclosure Date: March 23, 2022 (last updated October 07, 2023)
ASUS AC68U <=3.0.0.4.385.20852 is affected by a buffer overflow in blocking.cgi, which may cause a denial of service (DoS).
Attacker Value
Unknown

CVE-2021-45756

Disclosure Date: March 23, 2022 (last updated October 07, 2023)
Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.
Attacker Value
Unknown

CVE-2021-3128

Disclosure Date: April 12, 2021 (last updated February 22, 2025)
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
Attacker Value
Unknown

CVE-2018-18320

Disclosure Date: October 15, 2018 (last updated November 08, 2023)
An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because exec.php has a popen call. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution
0
Attacker Value
Unknown

CVE-2018-18319

Disclosure Date: October 15, 2018 (last updated November 08, 2023)
An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command&class=remote&Cc='ls' URI. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution
0
Attacker Value
Unknown

CVE-2018-0582

Disclosure Date: May 14, 2018 (last updated November 26, 2024)
Cross-site scripting vulnerability in ASUS RT-AC68U Firmware version prior to 3.0.0.4.380.1031 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0