• AsusWRT LAN Unauthenticated Remote Code Execution
    Disclosure Date: 2018-01-22
    First seen: 2020-04-26
    exploit/linux/http/asuswrt_lan_rce
    The HTTP server in AsusWRT has a flaw where it allows an unauthenticated client to perform a POST in certain cases. This can be combined with another vulnerability in the VPN configuration upload routine that sets NVRAM configuration variables directly from the POST request to enable a special command mode. This command mode can then be abused by sending a UDP packet to infosvr, which is running on port UDP 9999 to directly execute commands as root. This exploit leverages that to start telnetd in a random port, and then connects to it. It has been tested with the RT-AC68U running AsusWRT Version 3.0.0.4.380.7743. Authors: - Pedro Ribeiro <pedrib@gmail.com>
  • AsusWRT LAN Unauthenticated Remote Code Execution
    Disclosure Date: 2018-01-22
    First seen: 2020-04-26
    exploit/linux/http/asuswrt_lan_rce
    The HTTP server in AsusWRT has a flaw where it allows an unauthenticated client to perform a POST in certain cases. This can be combined with another vulnerability in the VPN configuration upload routine that sets NVRAM configuration variables directly from the POST request to enable a special command mode. This command mode can then be abused by sending a UDP packet to infosvr, which is running on port UDP 9999 to directly execute commands as root. This exploit leverages that to start telnetd in a random port, and then connects to it. It has been tested with the RT-AC68U running AsusWRT Version 3.0.0.4.380.7743. Authors: - Pedro Ribeiro <pedrib@gmail.com>
  • ASUS infosvr Auth Bypass Command Execution
    Disclosure Date: 2015-01-04
    First seen: 2020-04-26
    exploit/linux/misc/asus_infosvr_auth_bypass_exec
    This module exploits an authentication bypass vulnerability in the infosvr service running on UDP port 9999 on various ASUS routers to execute arbitrary commands as root. This module launches the BusyBox Telnet daemon on the port specified in the TelnetPort option to gain an interactive remote shell. This module was tested successfully on an ASUS RT-N12E with firmware version 2.0.0.35. Numerous ASUS models are reportedly affected, but untested. Authors: - Friedrich Postelstorfer - jduck <jduck@metasploit.com> - bcoles <bcoles@gmail.com>
  • ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow
    Disclosure Date: 2012-02-17
    First seen: 2020-04-26
    exploit/windows/browser/asus_net4switch_ipswcom
    This module exploits a vulnerability found in ASUS Net4Switch's ipswcom.dll ActiveX control. A buffer overflow condition is possible in multiple places due to the use of the CxDbgPrint() function, which allows remote attackers to gain arbitrary code execution under the context of the user. Authors: - Dmitriy Evdokimov - sinn3r <sinn3r@metasploit.com>
  • Asus Dpcproxy Buffer Overflow
    Disclosure Date: 2008-03-21
    First seen: 2020-04-26
    exploit/windows/misc/asus_dpcproxy_overflow
    This module exploits a stack buffer overflow in Asus Dpcroxy version 2.0.0.19. It should be vulnerable until version 2.0.0.24. Credit to Luigi Auriemma Authors: - Jacopo Cervini
5 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!