Search criteria
5 vulnerabilities found for RT-AC87U by ASUS Japan Inc.
CVE-2018-0581 (GCVE-0-2018-0581)
Vulnerability from cvelistv5 – Published: 2018-05-14 13:00 – Updated: 2024-08-05 03:28
VLAI?
Summary
Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- Cross-site scripting
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASUS Japan Inc. | RT-AC87U |
Affected:
Firmware version prior to 3.0.0.4.378.9383
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:28:11.190Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#33901663",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN33901663/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RT-AC87U",
"vendor": "ASUS Japan Inc.",
"versions": [
{
"status": "affected",
"version": "Firmware version prior to 3.0.0.4.378.9383"
}
]
}
],
"datePublic": "2018-05-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Cross-site scripting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-05-14T12:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#33901663",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN33901663/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2018-0581",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RT-AC87U",
"version": {
"version_data": [
{
"version_value": "Firmware version prior to 3.0.0.4.378.9383"
}
]
}
}
]
},
"vendor_name": "ASUS Japan Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#33901663",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN33901663/index.html"
},
{
"name": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/",
"refsource": "MISC",
"url": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2018-0581",
"datePublished": "2018-05-14T13:00:00",
"dateReserved": "2017-11-27T00:00:00",
"dateUpdated": "2024-08-05T03:28:11.190Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-0581 (GCVE-0-2018-0581)
Vulnerability from nvd – Published: 2018-05-14 13:00 – Updated: 2024-08-05 03:28
VLAI?
Summary
Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- Cross-site scripting
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASUS Japan Inc. | RT-AC87U |
Affected:
Firmware version prior to 3.0.0.4.378.9383
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:28:11.190Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#33901663",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN33901663/index.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "RT-AC87U",
"vendor": "ASUS Japan Inc.",
"versions": [
{
"status": "affected",
"version": "Firmware version prior to 3.0.0.4.378.9383"
}
]
}
],
"datePublic": "2018-05-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Cross-site scripting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-05-14T12:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#33901663",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN33901663/index.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2018-0581",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RT-AC87U",
"version": {
"version_data": [
{
"version_value": "Firmware version prior to 3.0.0.4.378.9383"
}
]
}
}
]
},
"vendor_name": "ASUS Japan Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting vulnerability in ASUS RT-AC87U Firmware version prior to 3.0.0.4.378.9383 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#33901663",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN33901663/index.html"
},
{
"name": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/",
"refsource": "MISC",
"url": "https://www.asus.com/Networking/RTAC87U/HelpDesk_BIOS/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2018-0581",
"datePublished": "2018-05-14T13:00:00",
"dateReserved": "2017-11-27T00:00:00",
"dateUpdated": "2024-08-05T03:28:11.190Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
JVNDB-2018-000042
Vulnerability from jvndb - Published: 2018-05-09 15:37 - Updated:2018-08-30 12:32
Severity ?
Summary
RT-AC87U vulnerable to cross-site scripting
Details
RT-AC87U provided by ASUS Japan Inc. is a wireless LAN router. RT-AC87U contains a cross-site scripting vulnerability (CWE-79).
Keigo Yamazaki of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000042.html",
"dc:date": "2018-08-30T12:32+09:00",
"dcterms:issued": "2018-05-09T15:37+09:00",
"dcterms:modified": "2018-08-30T12:32+09:00",
"description": "RT-AC87U provided by ASUS Japan Inc. is a wireless LAN router. RT-AC87U contains a cross-site scripting vulnerability (CWE-79).\r\n\r\nKeigo Yamazaki of LAC Co., Ltd. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000042.html",
"sec:cpe": {
"#text": "cpe:/h:misc:asus_japan_rt-ac87u",
"@product": "RT-AC87U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
"sec:cvss": [
{
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
{
"@score": "6.1",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2018-000042",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN33901663/index.html",
"@id": "JVN#33901663",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0581",
"@id": "CVE-2018-0581",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-0581",
"@id": "CVE-2018-0581",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "RT-AC87U vulnerable to cross-site scripting"
}
JVNDB-2015-000012
Vulnerability from jvndb - Published: 2015-01-27 14:24 - Updated:2015-06-17 16:42Summary
Multiple ASUS wireless LAN routers vulnerable to cross-site request forgery
Details
Multiple wireless LAN routers provided by ASUS JAPAN Inc. contain a cross-site request forgery vulnerability.
Masashi Sakai reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000012.html",
"dc:date": "2015-06-17T16:42+09:00",
"dcterms:issued": "2015-01-27T14:24+09:00",
"dcterms:modified": "2015-06-17T16:42+09:00",
"description": "Multiple wireless LAN routers provided by ASUS JAPAN Inc. contain a cross-site request forgery vulnerability.\r\n\r\nMasashi Sakai reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000012.html",
"sec:cpe": [
{
"#text": "cpe:/h:misc:asus_japan_rt-ac56s",
"@product": "RT-AC56S",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-ac68u",
"@product": "RT-AC68U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-ac87u",
"@product": "RT-AC87U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-n56u",
"@product": "RT-N56U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-n66u",
"@product": "RT-N66U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "2.6",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2015-000012",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN32631078/index.html",
"@id": "JVN#32631078",
"@source": "JVN"
},
{
"#text": "//cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7270",
"@id": "CVE-2014-7270",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7270",
"@id": "CVE-2014-7270",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-352",
"@title": "Cross-Site Request Forgery(CWE-352)"
}
],
"title": "Multiple ASUS wireless LAN routers vulnerable to cross-site request forgery"
}
JVNDB-2015-000011
Vulnerability from jvndb - Published: 2015-01-27 14:23 - Updated:2015-06-17 16:42Summary
Multiple ASUS wireless LAN routers vulnerable to OS command injection
Details
Multiple wireless LAN routers provided by ASUS JAPAN Inc. contain an OS command injection vulnerability.
Masashi Sakai reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000011.html",
"dc:date": "2015-06-17T16:42+09:00",
"dcterms:issued": "2015-01-27T14:23+09:00",
"dcterms:modified": "2015-06-17T16:42+09:00",
"description": "Multiple wireless LAN routers provided by ASUS JAPAN Inc. contain an OS command injection vulnerability.\r\n\r\nMasashi Sakai reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000011.html",
"sec:cpe": [
{
"#text": "cpe:/h:misc:asus_japan_rt-ac56s",
"@product": "RT-AC56S",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-ac68u",
"@product": "RT-AC68U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-ac87u",
"@product": "RT-AC87U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-n56u",
"@product": "RT-N56U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:misc:asus_japan_rt-n66u",
"@product": "RT-N66U",
"@vendor": "ASUS JAPAN Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "5.2",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2015-000011",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN77792759/index.html",
"@id": "JVN#77792759",
"@source": "JVN"
},
{
"#text": "//cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7269",
"@id": "CVE-2014-7269",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7269",
"@id": "CVE-2014-7269",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
}
],
"title": "Multiple ASUS wireless LAN routers vulnerable to OS command injection"
}