Description
A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.
Published: 2018-07-13
Score: 9.8 Critical
EPSS: 4.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-7479 A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.
History

No history.

Subscriptions

Asus Ea-n66 Ea-n66 Firmware Rp-ac52 Rp-ac52 Firmware Rp-ac56 Rp-ac56 Firmware Rp-n12 Rp-n12 Firmware Rp-n14 Rp-n14 Firmware Rp-n53 Rp-n53 Firmware Wmp-n12 Wmp-n12 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T01:36:28.511Z

Reserved: 2016-08-03T00:00:00.000Z

Link: CVE-2016-6558

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-13T20:29:00.847

Modified: 2024-11-21T02:56:21.187

Link: CVE-2016-6558

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses