Overview
ASUS's Wireless-N Gigabit Router RT-N56U is vulnerable to remote administrator password disclosure.
Description
ASUS's Wireless-N Gigabit Router RT-N56U contains a vulnerability which may allow a remote unauthenticated attacker to recover the device's administrator password. An attacker with network access to the device can navigate to the web page http://RouterIPAddress/QIS_wizard.htm?flag=detect. The attacker will be presented with a web page containing the device's configuration without entering any login credentials. This web page will display the device's administrator password. The default configuration for this device is to only allow clients connected to the Local Area Network (LAN) to access the system web interface. This vulnerability has been reported in ASUS's Wireless-N Gigabit Router RT-N56U firmware version 1.0.1.4. |
Impact
An unauthenticated attacker that is connected to the router's LAN may be able to retrieve the device's administrator password allowing them to directly access the device's configuration web page. |
Solution
Update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Plucky for reporting this vulnerability.
This document was written by Michael Orlando.
Other Information
CVE IDs: | None |
Severity Metric: | 1.86 |
Date Public: | 2011-08-25 |
Date First Published: | 2011-08-25 |
Date Last Updated: | 2011-08-26 19:03 UTC |
Document Revision: | 13 |