Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU6513
Risk: Low
CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-6547
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: Yes
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall update from vendor's website.
RT-AC53: 3.0.0.4.380.6038
RT-N600: All versions
RT-N300: All versions
RT-N66W: All versions
RT-N66U: B1
RT-N66R: All versions
RT-N56U: All versions
RT-N16: All versions
RT-N12E: All versions
RT-N12+: All versions
RT-N12: D1
RT-N11P: All versions
RT-AC5300: All versions
RT-AC3200: All versions
RT-AC3100: All versions
RT-AC1750: All versions
RT-AC1200: All versions
RT-AC88U: All versions
RT-AC87U: All versions
RT-AC87R: All versions
RT-AC68R: All versions
RT-AC68P: All versions
RT-AC68W: All versions
RT-AC66W: All versions
RT-AC68UF: All versions
RT-AC68U: All versions
RT-AC66U: All versions
RT-AC56U: All versions
RT-AC56S: All versions
RT-AC56R: All versions
RT-AC55U: All versions
RT-AC52U B1: All versions
RT-AC51U: All versions
External linkshttp://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU6514
Risk: Low
CVSSv3.1: 4.2 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-6549
CWE-ID:
CWE-592 - Authentication Bypass Issues
Exploit availability: Yes
DescriptionThe vulnerability allows a remote unauthenticated user to hijack any active admin session.
The weakness exists due to improper input validation. A remote attacker can send cgi_logout and asusrouter-Windows-IFTTT-1.0 in certain HTTP headers and gain the session cookies to hijack the valid user's session.
Successful exploitation of the vulnerability leads to session steal.
MitigationInstall update from vendor's website.
RT-AC53: 3.0.0.4.380.6038
RT-N600: All versions
RT-N300: All versions
RT-N66W: All versions
RT-N66U: B1
RT-N66R: All versions
RT-N56U: All versions
RT-N16: All versions
RT-N12E: All versions
RT-N12+: All versions
RT-N12: D1
RT-N11P: All versions
RT-AC5300: All versions
RT-AC3200: All versions
RT-AC3100: All versions
RT-AC1750: All versions
RT-AC1200: All versions
RT-AC88U: All versions
RT-AC87U: All versions
RT-AC87R: All versions
RT-AC68R: All versions
RT-AC68P: All versions
RT-AC68W: All versions
RT-AC66W: All versions
RT-AC68UF: All versions
RT-AC68U: All versions
RT-AC66U: All versions
RT-AC56U: All versions
RT-AC56S: All versions
RT-AC56R: All versions
RT-AC55U: All versions
RT-AC52U B1: All versions
RT-AC51U: All versions
External linkshttp://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU6515
Risk: High
CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-6548
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: Yes
DescriptionThe vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness exists due to stack-based buffer overflow. A remote attacker can send a specially crafted multicast messages containing a long host or port, trigger memory corruption, gain control over networkmap
’s control flow and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability result in arbitrary code execution.
MitigationInstall update from vendor's website.
RT-AC53: 3.0.0.4.380.6038
RT-N600: All versions
RT-N300: All versions
RT-N66W: All versions
RT-N66U: B1
RT-N66R: All versions
RT-N56U: All versions
RT-N16: All versions
RT-N12E: All versions
RT-N12+: All versions
RT-N12: D1
RT-N11P: All versions
RT-AC5300: All versions
RT-AC3200: All versions
RT-AC3100: All versions
RT-AC1750: All versions
RT-AC1200: All versions
RT-AC88U: All versions
RT-AC87U: All versions
RT-AC87R: All versions
RT-AC68R: All versions
RT-AC68P: All versions
RT-AC68W: All versions
RT-AC66W: All versions
RT-AC68UF: All versions
RT-AC68U: All versions
RT-AC66U: All versions
RT-AC56U: All versions
RT-AC56S: All versions
RT-AC56R: All versions
RT-AC55U: All versions
RT-AC52U B1: All versions
RT-AC51U: All versions
External linkshttp://bierbaumer.net/security/asuswrt/#cross-site-scripting-xss
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.