Overview
The ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, is vulnerable to cross-site request forgery and command injection.
Description
CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2016-6557 The RP-AC52 web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. |
Impact
A remote, unauthenticated attacker may be able to trick an authenticated user into clicking a specially crafted link, resulting in settings modification, privilege escalation, or complete control of the system. |
Solution
Apply an update |
Restrict access and use strong passwords |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 8 | E:POC/RL:W/RC:ND |
Environmental | 6.0 | CDP:N/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Ian Smith for reporting these vulnerabilities.
This document was written by Trent Novelly.
Other Information
CVE IDs: | CVE-2016-6557 , CVE-2016-6558 |
Date Public: | 2016-10-17 |
Date First Published: | 2016-10-17 |
Date Last Updated: | 2016-10-28 17:07 UTC |
Document Revision: | 17 |