MikroTik RouterOS v7.1 to 7.11 was discovered to contain incorrect access control mechanisms in place for the Rest API.
Source: MITRE
Max CVSS
5.3
EPSS Score
0.05%
Published
2023-11-14
Updated
2023-11-21
Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Router Advertisement Daemon. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19797.
Source: Zero Day Initiative
Max CVSS
7.5
EPSS Score
0.08%
Published
2024-05-03
Updated
2024-05-03
The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.
Source: VulnCheck
Max CVSS
7.5
EPSS Score
0.05%
Published
2023-09-07
Updated
2023-09-12
MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
Source: VulnCheck
Max CVSS
9.1
EPSS Score
0.07%
Published
2023-07-19
Updated
2023-07-28
An issue in the bridge2 component of MikroTik RouterOS v6.40.5 allows attackers to cause a Denial of Service (DoS) via crafted packets.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-03-27
Updated
2023-03-31
Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.32%
Published
2022-12-05
Updated
2023-02-03
Mikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot process. This vulnerability allows attackers to execute arbitrary code via a crafted nova message.
Source: MITRE
Max CVSS
8.8
EPSS Score
0.11%
Published
2022-12-05
Updated
2023-02-03
Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.07%
Published
2022-08-26
Updated
2022-09-01
The container package in MikroTik RouterOS 7.4beta4 allows an attacker to create mount points pointing to symbolic links, which resolve to locations on the host device. This allows the attacker to mount any arbitrary file to any location on the host.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.33%
Published
2022-08-25
Updated
2022-08-31
In the SCEP Server of RouterOS in certain Mikrotik products, an attacker can trigger a heap-based buffer overflow that leads to remote code execution. The attacker must know the scep_server_name value. This affects RouterOS 6.46.8, 6.47.9, and 6.47.10.
Source: MITRE
Max CVSS
8.1
EPSS Score
0.35%
Published
2022-03-16
Updated
2022-06-30
Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the tr069-client process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
Source: MITRE
Max CVSS
6.5
EPSS Score
0.10%
Published
2022-05-11
Updated
2022-10-18
Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the ptp process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
Source: MITRE
Max CVSS
6.5
EPSS Score
0.10%
Published
2022-05-11
Updated
2022-10-18
MikroTik RouterOS 6.47.9 allows remote authenticated ftp users to create or overwrite arbitrary .rsc files via the /export command. NOTE: the vendor's position is that this is intended behavior because of how user policies work
Source: MITRE
Max CVSS
8.5
EPSS Score
0.15%
Published
2021-03-19
Updated
2024-05-17
In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter.
Source: MITRE
Max CVSS
6.1
EPSS Score
0.07%
Published
2021-01-04
Updated
2021-01-07
A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted FTP requests.
Source: MITRE
Max CVSS
7.8
EPSS Score
0.11%
Published
2022-02-28
Updated
2022-03-08
A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted SMB requests.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.11%
Published
2022-02-28
Updated
2022-07-12
Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/resolver process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.20%
Published
2021-05-11
Updated
2022-06-28
Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/dot1x process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
Source: MITRE
Max CVSS
6.5
EPSS Score
0.21%
Published
2021-05-19
Updated
2022-06-28
Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /ram/pckg/wireless/nova/bin/wireless process. An authenticated remote attacker can cause a Denial of Service due via a crafted packet.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.14%
Published
2021-05-11
Updated
2022-06-28
Mikrotik RouterOs before 6.47 (stable tree) in the /ram/pckg/advanced-tools/nova/bin/netwatch process. An authenticated remote attacker can cause a Denial of Service due to a divide by zero error.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.16%
Published
2021-05-19
Updated
2021-06-01
Mikrotik RouterOs before 6.47 (stable tree) suffers from an assertion failure vulnerability in the /ram/pckg/security/nova/bin/ipsec process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.13%
Published
2021-07-21
Updated
2021-07-30
Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
Source: MITRE
Max CVSS
6.5
EPSS Score
0.35%
Published
2021-05-18
Updated
2022-06-28
Mikrotik RouterOs before 6.47 (stable tree) suffers from a divison by zero vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service due to a divide by zero error.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.16%
Published
2021-05-18
Updated
2021-05-25
Mikrotik RouterOs before stable version 6.47 suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
Source: MITRE
Max CVSS
6.5
EPSS Score
0.20%
Published
2021-07-13
Updated
2022-06-28
Mikrotik RouterOs before stable version 6.47 suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). NOTE: this is different from CVE-2020-20253 and CVE-2020-20254. All four vulnerabilities in the /nova/bin/lcdstat process are discussed in the CVE-2020-20250 github.com/cq674350529 reference.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.20%
Published
2021-07-13
Updated
2022-06-28
78 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!