Lucene search

K
cve[email protected]CVE-2014-2719
HistoryApr 22, 2014 - 1:06 p.m.

CVE-2014-2719

2014-04-2213:06:29
CWE-200
web.nvd.nist.gov
19
asus
rt series
routers
firmware
security
vulnerability
cve-2014-2719

6.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:C/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.0%

Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.

Affected configurations

NVD
Node
asusrt-ac66u_firmwareMatch3.0.0.4.140
OR
asusrt-ac66u_firmwareMatch3.0.0.4.220
OR
asusrt-ac66u_firmwareMatch3.0.0.4.246
OR
asusrt-ac66u_firmwareMatch3.0.0.4.260
OR
asusrt-ac66u_firmwareMatch3.0.0.4.270
OR
asusrt-ac66u_firmwareMatch3.0.0.4.354
OR
asusrt-ac68u_firmwareMatch3.0.0.4.374.4755
OR
asusrt-ac68u_firmwareMatch3.0.0.4.374_4561
OR
asusrt-ac68u_firmwareMatch3.0.0.4.374_4887
OR
asusrt-n10e_firmwareMatch2.0.0.7
OR
asusrt-n10e_firmwareMatch2.0.0.10
OR
asusrt-n10e_firmwareMatch2.0.0.16
OR
asusrt-n10e_firmwareMatch2.0.0.19
OR
asusrt-n10e_firmwareMatch2.0.0.20
OR
asusrt-n10e_firmwareMatch2.0.0.24
OR
asusrt-n10e_firmwareMatch2.0.0.25
OR
asusrt-n14u_firmwareMatch3.0.0.4.322
OR
asusrt-n14u_firmwareMatch3.0.0.4.356
OR
asusrt-n16_firmwareMatch1.0.1.9
OR
asusrt-n16_firmwareMatch1.0.2.3
OR
asusrt-n16_firmwareMatch3.0.0.3.108
OR
asusrt-n16_firmwareMatch3.0.0.3.162
OR
asusrt-n16_firmwareMatch3.0.0.3.178
OR
asusrt-n16_firmwareMatch3.0.0.4.220
OR
asusrt-n16_firmwareMatch3.0.0.4.246
OR
asusrt-n16_firmwareMatch3.0.0.4.260
OR
asusrt-n16_firmwareMatch3.0.0.4.354
OR
asusrt-n16_firmwareMatch7.0.2.38b
OR
asusrt-n56u_firmwareMatch1.0.1.4
OR
asusrt-n56u_firmwareMatch1.0.1.4o
OR
asusrt-n56u_firmwareMatch1.0.1.7c
OR
asusrt-n56u_firmwareMatch1.0.1.7f
OR
asusrt-n56u_firmwareMatch1.0.1.8j
OR
asusrt-n56u_firmwareMatch1.0.1.8l
OR
asusrt-n56u_firmwareMatch1.0.1.8n
OR
asusrt-n56u_firmwareMatch3.0.0.4.318
OR
asusrt-n56u_firmwareMatch3.0.0.4.334
OR
asusrt-n56u_firmwareMatch3.0.0.4.342
OR
asusrt-n56u_firmwareMatch3.0.0.4.360
OR
asusrt-n56u_firmwareMatch7.0.1.21
OR
asusrt-n56u_firmwareMatch7.0.1.32
OR
asusrt-n56u_firmwareMatch8.1.1.4
OR
asusrt-n65u_firmwareMatch3.0.0.3.134
OR
asusrt-n65u_firmwareMatch3.0.0.3.176
OR
asusrt-n65u_firmwareMatch3.0.0.4.260
OR
asusrt-n65u_firmwareMatch3.0.0.4.334
OR
asusrt-n65u_firmwareMatch3.0.0.4.342
OR
asusrt-n65u_firmwareMatch3.0.0.4.346
OR
asusrt-n66u_firmwareMatch3.0.0.4.272
OR
asusrt-n66u_firmwareMatch3.0.0.4.370
AND
asusrt-ac68uMatch-
Node
t-mobiletm-ac1900Match3.0.0.4.376_3169

6.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:C/I:N/A:N

6.6 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

54.0%

Related for CVE-2014-2719