MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
Max CVSS
9.1
EPSS Score
0.06%
Published
2023-07-19
Updated
2023-07-28
Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet.
Max CVSS
9.8
EPSS Score
0.31%
Published
2022-12-05
Updated
2023-02-03
The container package in MikroTik RouterOS 7.4beta4 allows an attacker to create mount points pointing to symbolic links, which resolve to locations on the host device. This allows the attacker to mount any arbitrary file to any location on the host.
Max CVSS
9.8
EPSS Score
0.33%
Published
2022-08-25
Updated
2022-08-31

CVE-2018-14847

Known exploited
Public exploit
MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
Max CVSS
9.1
EPSS Score
97.50%
Published
2018-08-02
Updated
2019-03-07
CISA KEV Added
2021-12-01

CVE-2018-7445

Known exploited
A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
Max CVSS
10.0
EPSS Score
88.07%
Published
2018-03-19
Updated
2018-04-24
CISA KEV Added
2022-09-08
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.
Max CVSS
9.0
EPSS Score
2.15%
Published
2018-08-23
Updated
2020-08-24
The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.
Max CVSS
9.8
EPSS Score
0.32%
Published
2022-10-15
Updated
2022-10-20
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!