CVE-2018-20334

CVSS V2 High 10 CVSS V3 Critical 9.8
Description
An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.
Overview
  • CVE ID
  • CVE-2018-20334
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-03-20T01:15:22
  • Last Modified Date
  • 2020-03-23T21:59:04
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:asus:asuswrt:3.0.0.4.384.20308:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:gt-ac5300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac1200_v2:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac1200ge:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac66u-b1:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-acrh12:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-g32:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n10\+d1:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n14u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n16:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n56r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n600:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n65u:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://starlabs.sg/advisories/18-20334/ Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:46:33 Added to TrackCVE
2022-12-04 13:09:31 2020-03-20T01:15Z 2020-03-20T01:15:22 CVE Published Date updated
2022-12-04 13:09:31 2020-03-23T21:59:04 CVE Modified Date updated
2022-12-04 13:09:31 Analyzed Vulnerability Status updated