Lucene search

K
cve[email protected]CVE-2014-9583
HistoryJan 08, 2015 - 8:59 p.m.

CVE-2014-9583

2015-01-0820:59:02
CWE-264
web.nvd.nist.gov
110
cve-2014-9583
asus
wrt firmware
remote attackers
authentication bypass

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.6 High

AI Score

Confidence

High

0.965 High

EPSS

Percentile

99.6%

common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.

Affected configurations

NVD
Node
t-mobiletm-ac1900Match3.0.0.4.376_3169
Node
asuswrt_firmwareMatch3.0.0.4.376.2524-g0012f52
OR
asuswrt_firmwareMatch3.0.0.4.376_1071
AND
asusrt-ac66u
OR
asusrt-n66u

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.6 High

AI Score

Confidence

High

0.965 High

EPSS

Percentile

99.6%