CVE-2018-14847

Known exploited
Public exploit
MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
Max CVSS
9.1
EPSS Score
97.50%
Published
2018-08-02
Updated
2019-03-07
CISA KEV Added
2021-12-01
A vulnerability in MikroTik Version 6.41.4 could allow an unauthenticated remote attacker to exhaust all available CPU and all available RAM by sending a crafted FTP request on port 21 that begins with many '\0' characters, preventing the affected router from accepting new FTP connections. The router will reboot after 10 minutes, logging a "router was rebooted without proper shutdown" message.
Max CVSS
7.8
EPSS Score
1.56%
Published
2018-04-16
Updated
2018-05-22
An issue was discovered in MikroTik RouterOS 6.41.4. Missing OpenVPN server certificate verification allows a remote unauthenticated attacker capable of intercepting client traffic to act as a malicious OpenVPN server. This may allow the attacker to gain access to the client's internal network (for example, at site-to-site tunnels).
Max CVSS
8.1
EPSS Score
0.48%
Published
2018-04-13
Updated
2018-05-17

CVE-2018-7445

Known exploited
A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.
Max CVSS
10.0
EPSS Score
88.07%
Published
2018-03-19
Updated
2018-04-24
CISA KEV Added
2022-09-08
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory corruption vulnerability. An authenticated remote attacker can crash the HTTP server by rapidly authenticating and disconnecting.
Max CVSS
6.5
EPSS Score
0.31%
Published
2018-08-23
Updated
2018-10-12
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON.
Max CVSS
6.5
EPSS Score
0.51%
Published
2018-08-23
Updated
2020-08-24
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system via a crafted HTTP POST request.
Max CVSS
6.8
EPSS Score
0.39%
Published
2018-08-23
Updated
2019-07-23
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.
Max CVSS
9.0
EPSS Score
2.15%
Published
2018-08-23
Updated
2020-08-24
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!