Search criteria
6 vulnerabilities found for rt-n65u_firmware by asus
FKIE_CVE-2014-2719
Vulnerability from fkie_nvd - Published: 2014-04-22 13:06 - Updated: 2025-04-12 10:46
Severity ?
Summary
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*",
"matchCriteriaId": "A946A449-7623-48FE-878A-E17DA2F41A11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
"matchCriteriaId": "A023852A-84B7-4937-886D-8893CD778DDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
"matchCriteriaId": "553DE051-C59F-4B16-A733-C2055B14DB1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*",
"matchCriteriaId": "37AE944A-EF53-4F57-8A86-7DE209F00D17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.354:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE0E4E9-B08F-4DB3-A5D5-DBCDA81E4200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374.4755:*:*:*:*:*:*:*",
"matchCriteriaId": "536FCD9A-4DBA-465D-8FE8-9E9D815BAB81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4561:*:*:*:*:*:*:*",
"matchCriteriaId": "6E3E3F39-1F5A-4AE5-A379-3344BFC1E00D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4887:*:*:*:*:*:*:*",
"matchCriteriaId": "753D3C81-F078-47B9-8D0B-822EBE9443AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB012B3-5C57-4310-8F1A-208D2E470A6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8F1D15BC-D83F-4949-863B-817FA2A0A23D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACDCE11-5422-4AB1-AC89-3C3DF05FDE1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "3C7607C5-EF0C-40FA-BADA-2316BA4A5E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "340D98A2-2018-4A24-B654-3A7032FCE518",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "94999CA4-A60A-4F1E-8933-2CB1CA9D83A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "132C4DDD-5914-47E0-BDBA-E918E7F0E747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A0A4C1-226A-42D5-A728-CBB7D2B02A50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.356:*:*:*:*:*:*:*",
"matchCriteriaId": "3A04943B-0627-4B6D-A01A-3722F7025723",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C76611FB-9811-48E5-8F16-824A15CFC226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6887911A-9CD0-419C-AE2E-932F8AD179DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*",
"matchCriteriaId": "65D943A4-CD5D-4381-8C4F-FF4FC600F226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*",
"matchCriteriaId": "5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*",
"matchCriteriaId": "939D788D-BFF7-4DEB-8C47-751532E4AC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
"matchCriteriaId": "8C1CCB22-3D8D-4618-819B-2EA14C42A4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
"matchCriteriaId": "715FFC31-33A1-469E-BF65-4749F6643EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.354:*:*:*:*:*:*:*",
"matchCriteriaId": "C1A3AFBC-A89F-4037-B863-55F7791A3635",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8E3CB7-1ADA-428C-881F-BB266991F39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*",
"matchCriteriaId": "699F6C57-F1AE-4AF5-BF56-529D41C91068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*",
"matchCriteriaId": "F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*",
"matchCriteriaId": "69C68ABB-391D-45D8-9250-D93F8BFE305C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FDDF9C-4C30-4AAC-9449-7404181071B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8F24A-837B-4198-B8F6-E42386D2F524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*",
"matchCriteriaId": "14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*",
"matchCriteriaId": "E2660735-2247-42D9-9BAA-D785D18E6F51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
"matchCriteriaId": "401BB537-95FB-4BFB-BC40-CD73817D7E9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
"matchCriteriaId": "04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.360:*:*:*:*:*:*:*",
"matchCriteriaId": "C3C65A6B-4F24-4DFE-B478-49BEE4A5FC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF40558-B7F8-4A2B-9819-EE3DD2C183AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F70D82C1-764C-4DF0-B296-964602D0EC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*",
"matchCriteriaId": "02E9974C-F3E1-4145-865F-974982804823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*",
"matchCriteriaId": "B3979CD4-DFBC-460C-8E92-879F7C355D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA3F63E-F4FA-4066-AEA0-B1149E4B1190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
"matchCriteriaId": "1E9A77E0-1CC3-4E07-B99A-8DC750C982F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
"matchCriteriaId": "642056A2-9B4E-465C-8333-392C70D658AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.346:*:*:*:*:*:*:*",
"matchCriteriaId": "8E68C357-45E5-4086-9697-A9DD75E22063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*",
"matchCriteriaId": "82C3DA99-69D6-4C2D-B485-7785EEDA38F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.370:*:*:*:*:*:*:*",
"matchCriteriaId": "16CE2D06-AFAB-4284-9C63-A088F4ACEBAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*",
"matchCriteriaId": "919D9673-1FCA-431D-9F30-643AAEFAC1DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
},
{
"lang": "es",
"value": "Advanced_System_Content.asp en routers de la serie ASUS RT con firmware anterior a 3.0.0.4.374.5517, cuando una sesi\u00f3n de administrador est\u00e1 activa, permite a usuarios remotos autenticados obtener el nombre de usuario y contrase\u00f1a del administrador mediante la lectura del c\u00f3digo fuente."
}
],
"id": "CVE-2014-2719",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-04-22T13:06:29.493",
"references": [
{
"source": "cve@mitre.org",
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"source": "cve@mitre.org",
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"source": "cve@mitre.org",
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"source": "cve@mitre.org",
"url": "https://support.t-mobile.com/docs/DOC-21994"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.t-mobile.com/docs/DOC-21994"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4937
Vulnerability from fkie_nvd - Published: 2013-07-26 12:05 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC5E8AB-ADD3-4C8D-ABAB-6D899174280E",
"versionEndIncluding": "3.0.0.4.354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.140:*:*:*:*:*:*:*",
"matchCriteriaId": "A946A449-7623-48FE-878A-E17DA2F41A11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
"matchCriteriaId": "A023852A-84B7-4937-886D-8893CD778DDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB8B4AB-0EF4-4963-AE20-F4F1C3ABFC26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
"matchCriteriaId": "553DE051-C59F-4B16-A733-C2055B14DB1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.270:*:*:*:*:*:*:*",
"matchCriteriaId": "37AE944A-EF53-4F57-8A86-7DE209F00D17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:rt-n66u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C801E60F-6D3D-4179-AA38-1268338C03DE",
"versionEndIncluding": "3.0.0.4.370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.272:*:*:*:*:*:*:*",
"matchCriteriaId": "82C3DA99-69D6-4C2D-B485-7785EEDA38F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4769A7-BFC5-43DF-9FEE-14CC9BB8BD4F",
"versionEndIncluding": "3.0.0.4.346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.134:*:*:*:*:*:*:*",
"matchCriteriaId": "02E9974C-F3E1-4145-865F-974982804823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.3.176:*:*:*:*:*:*:*",
"matchCriteriaId": "B3979CD4-DFBC-460C-8E92-879F7C355D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA3F63E-F4FA-4066-AEA0-B1149E4B1190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
"matchCriteriaId": "1E9A77E0-1CC3-4E07-B99A-8DC750C982F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n65u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
"matchCriteriaId": "642056A2-9B4E-465C-8333-392C70D658AD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5567C97-0AE2-429B-B4D7-1CF501BD2C07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:rt-n14u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3FB0ED-9BF8-4F77-AEA0-536A961CE5F5",
"versionEndIncluding": "3.0.0.4.356",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n14u_firmware:3.0.0.4.322:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A0A4C1-226A-42D5-A728-CBB7D2B02A50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85B0C29C-29A5-4659-8D76-9241B13682DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE3A93F2-C6C1-48F9-9273-3A322A8951A8",
"versionEndIncluding": "3.0.0.4.354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C76611FB-9811-48E5-8F16-824A15CFC226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:1.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6887911A-9CD0-419C-AE2E-932F8AD179DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.108:*:*:*:*:*:*:*",
"matchCriteriaId": "65D943A4-CD5D-4381-8C4F-FF4FC600F226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.162:*:*:*:*:*:*:*",
"matchCriteriaId": "5AA3CD4B-B518-459B-AFF5-CCFF47D3BAEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.3.178:*:*:*:*:*:*:*",
"matchCriteriaId": "939D788D-BFF7-4DEB-8C47-751532E4AC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.220:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6BBB0E-D69B-4854-8A5C-D6C20ABB857E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.246:*:*:*:*:*:*:*",
"matchCriteriaId": "8C1CCB22-3D8D-4618-819B-2EA14C42A4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:3.0.0.4.260:*:*:*:*:*:*:*",
"matchCriteriaId": "715FFC31-33A1-469E-BF65-4749F6643EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n16_firmware:7.0.2.38b:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0EAF76-C2F8-4AD5-BF3D-0922DEED7B46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E016FE0-0A28-49AA-A213-38A5F7728FE2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3027E138-144F-4E36-8C6C-E4A3E71CB1E7",
"versionEndIncluding": "3.0.0.4.360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8E3CB7-1ADA-428C-881F-BB266991F39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.4o:*:*:*:*:*:*:*",
"matchCriteriaId": "699F6C57-F1AE-4AF5-BF56-529D41C91068",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7c:*:*:*:*:*:*:*",
"matchCriteriaId": "F17E0B8C-7BA1-4FC5-84EC-4FFC87A9AC12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.7f:*:*:*:*:*:*:*",
"matchCriteriaId": "69C68ABB-391D-45D8-9250-D93F8BFE305C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8j:*:*:*:*:*:*:*",
"matchCriteriaId": "D1FDDF9C-4C30-4AAC-9449-7404181071B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8l:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE8F24A-837B-4198-B8F6-E42386D2F524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:1.0.1.8n:*:*:*:*:*:*:*",
"matchCriteriaId": "14A9D580-ACD6-4F2F-9322-E6B4C72C8BE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.318:*:*:*:*:*:*:*",
"matchCriteriaId": "E2660735-2247-42D9-9BAA-D785D18E6F51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.334:*:*:*:*:*:*:*",
"matchCriteriaId": "401BB537-95FB-4BFB-BC40-CD73817D7E9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:3.0.0.4.342:*:*:*:*:*:*:*",
"matchCriteriaId": "04A7CA72-DFAD-4E9A-BB3E-EAE9973C19C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "64BCA764-5BAD-4CAB-B39F-A1D67E44EDA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:7.0.1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF40558-B7F8-4A2B-9819-EE3DD2C183AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:rt-n56u_firmware:8.1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F70D82C1-764C-4DF0-B296-964602D0EC54",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "534C0C95-9DD2-464C-8776-01B47398FE13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6573DB51-CD36-4F99-82D6-EE52CA0E5136",
"versionEndIncluding": "3.0.0.4.364",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:1.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3A02DC87-A0B4-460F-BE23-AFF51F52427C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.188:*:*:*:*:*:*:*",
"matchCriteriaId": "AE119718-A2F2-47A8-869F-3229A788EB04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:asus:dsl-n56u_firmware:3.0.0.4.314:*:*:*:*:*:*:*",
"matchCriteriaId": "5199B461-E2F0-4F35-963E-B3716AB5A04E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:asus:dsl-n55u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B81970C5-B766-4D2E-91EE-ADD5A9B77FF8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades no especificadas en la caracter\u00edstica AiCloud de los ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, y DSL-N55U con firmware anteriores a v3.0.4.372 tienen impacto y vectores de ataque desconocidos."
}
],
"id": "CVE-2013-4937",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-07-26T12:05:40.867",
"references": [
{
"source": "cve@mitre.org",
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"source": "cve@mitre.org",
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-2719 (GCVE-0-2014-2719)
Vulnerability from cvelistv5 – Published: 2014-04-21 14:00 – Updated: 2024-08-06 10:21
VLAI?
Summary
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:21:36.055Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.t-mobile.com/docs/DOC-21994"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-09-16T13:57:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.t-mobile.com/docs/DOC-21994"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2719",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html",
"refsource": "MISC",
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"name": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29",
"refsource": "CONFIRM",
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"name": "https://support.t-mobile.com/docs/DOC-21994",
"refsource": "CONFIRM",
"url": "https://support.t-mobile.com/docs/DOC-21994"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2719",
"datePublished": "2014-04-21T14:00:00",
"dateReserved": "2014-04-01T00:00:00",
"dateUpdated": "2024-08-06T10:21:36.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4937 (GCVE-0-2013-4937)
Vulnerability from cvelistv5 – Published: 2013-07-26 10:00 – Updated: 2024-09-17 02:46
VLAI?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:40.986Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-07-26T10:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4937",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://reviews.cnet.com/8301-3132_7-57594003-98",
"refsource": "MISC",
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"name": "http://twitter.com/ASUSUSA/statuses/357612236392509440",
"refsource": "CONFIRM",
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4937",
"datePublished": "2013-07-26T10:00:00Z",
"dateReserved": "2013-07-26T00:00:00Z",
"dateUpdated": "2024-09-17T02:46:42.662Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2719 (GCVE-0-2014-2719)
Vulnerability from nvd – Published: 2014-04-21 14:00 – Updated: 2024-08-06 10:21
VLAI?
Summary
Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:21:36.055Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.t-mobile.com/docs/DOC-21994"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-04-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-09-16T13:57:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.t-mobile.com/docs/DOC-21994"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2719",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html",
"refsource": "MISC",
"url": "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
},
{
"name": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29",
"refsource": "CONFIRM",
"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
},
{
"name": "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Apr/225"
},
{
"name": "https://support.t-mobile.com/docs/DOC-21994",
"refsource": "CONFIRM",
"url": "https://support.t-mobile.com/docs/DOC-21994"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2719",
"datePublished": "2014-04-21T14:00:00",
"dateReserved": "2014-04-01T00:00:00",
"dateUpdated": "2024-08-06T10:21:36.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4937 (GCVE-0-2013-4937)
Vulnerability from nvd – Published: 2013-07-26 10:00 – Updated: 2024-09-17 02:46
VLAI?
Summary
Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:59:40.986Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-07-26T10:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4937",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://reviews.cnet.com/8301-3132_7-57594003-98",
"refsource": "MISC",
"url": "http://reviews.cnet.com/8301-3132_7-57594003-98"
},
{
"name": "http://twitter.com/ASUSUSA/statuses/357612236392509440",
"refsource": "CONFIRM",
"url": "http://twitter.com/ASUSUSA/statuses/357612236392509440"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-4937",
"datePublished": "2013-07-26T10:00:00Z",
"dateReserved": "2013-07-26T00:00:00Z",
"dateUpdated": "2024-09-17T02:46:42.662Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}