Description
In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.
Published: 2018-07-13
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-7478 In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.
History

No history.

Subscriptions

Asus Ea-n66 Ea-n66 Firmware Rp-ac52 Rp-ac52 Firmware Rp-ac56 Rp-ac56 Firmware Rp-n12 Rp-n12 Firmware Rp-n14 Rp-n14 Firmware Rp-n53 Rp-n53 Firmware Wmp-n12 Wmp-n12 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T01:36:28.591Z

Reserved: 2016-08-03T00:00:00.000Z

Link: CVE-2016-6557

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-13T20:29:00.817

Modified: 2024-11-21T02:56:21.063

Link: CVE-2016-6557

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses