Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2014-9583

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2014-9583
Last Modified 17 Sep 2015 09:59:23
Published 08 Jan 2015 03:59:02
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2014-9583

Summary

common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.

Vulnerable Systems

Operating System

  • Asus Wrt Firmware 3.0.0.4.376 1071

  • Asus Wrt Firmware 3.0.0.4.376.2524-g0012f52


References

MISC - https://github.com/jduck/asus-cmd

EXPLOIT-DB - 35688

MISC - http://packetstormsecurity.com/files/129815/ASUSWRT-3.0.0.4.376_1071-LAN-Backdoor-Command-Execution.html

CONFIRM - https://support.t-mobile.com/docs/DOC-21994


Last Updated: 27 May 2016 11:07:28