ID

VAR-201807-0054


CVE

CVE-2016-6558


TITLE

ASUS RP-AC52 contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#763843

DESCRIPTION

A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed. ASUS RP-AC52 Access Point is prone to the following multiple security issues: 1. Cross-site request-forgery vulnerability 2. A command-injection vulnerability An attacker may leverage these issues to perform certain unauthorized actions and gain access to the affected application or execute commands in the context of the affected application. A remote attacker could exploit this vulnerability to execute arbitrary commands

Trust: 2.7

sources: NVD: CVE-2016-6558 // CERT/CC: VU#763843 // JVNDB: JVNDB-2016-009197 // BID: 93596 // VULHUB: VHN-95378

AFFECTED PRODUCTS

vendor:asusmodel:rp-ac56scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-n14scope:eqversion: -

Trust: 1.6

vendor:asusmodel:ea-n66scope:eqversion: -

Trust: 1.6

vendor:asusmodel:wmp-n12scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-n53scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-n12scope:eqversion: -

Trust: 1.6

vendor:asusmodel:rp-ac52scope:lteversion:1.0.1.1s

Trust: 1.0

vendor:asustek computermodel: - scope: - version: -

Trust: 0.8

vendor:asustek computermodel:ea-n66scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-ac52scope:lteversion:1.0.1.1s

Trust: 0.8

vendor:asustek computermodel:rp-ac56scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-n12scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-n14scope: - version: -

Trust: 0.8

vendor:asustek computermodel:rp-n53scope: - version: -

Trust: 0.8

vendor:asustek computermodel:wmp-n12scope: - version: -

Trust: 0.8

vendor:asusmodel:rp-ac52scope:eqversion:1.0.1.1s

Trust: 0.6

vendor:asusmodel:rp-ac52 1.0.1.1sscope: - version: -

Trust: 0.3

sources: CERT/CC: VU#763843 // BID: 93596 // JVNDB: JVNDB-2016-009197 // CNNVD: CNNVD-201610-446 // NVD: CVE-2016-6558

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6558
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-6558
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201610-446
value: CRITICAL

Trust: 0.6

VULHUB: VHN-95378
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-6558
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-95378
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6558
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-95378 // JVNDB: JVNDB-2016-009197 // CNNVD: CNNVD-201610-446 // NVD: CVE-2016-6558

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.9

sources: VULHUB: VHN-95378 // JVNDB: JVNDB-2016-009197 // NVD: CVE-2016-6558

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-446

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201610-446

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-009197

PATCH

title:RP-AC52url:https://www.asus.com/Networking/RPAC52/

Trust: 0.8

title:ASUS RP-AC52 Access Point Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99592

Trust: 0.6

sources: JVNDB: JVNDB-2016-009197 // CNNVD: CNNVD-201610-446

EXTERNAL IDS

db:CERT/CCid:VU#763843

Trust: 3.6

db:NVDid:CVE-2016-6558

Trust: 2.8

db:BIDid:93596

Trust: 2.0

db:JVNid:JVNVU96741452

Trust: 0.8

db:JVNDBid:JVNDB-2016-009197

Trust: 0.8

db:CNNVDid:CNNVD-201610-446

Trust: 0.7

db:VULHUBid:VHN-95378

Trust: 0.1

sources: CERT/CC: VU#763843 // VULHUB: VHN-95378 // BID: 93596 // JVNDB: JVNDB-2016-009197 // CNNVD: CNNVD-201610-446 // NVD: CVE-2016-6558

REFERENCES

url:https://www.kb.cert.org/vuls/id/763843

Trust: 2.8

url:https://www.securityfocus.com/bid/93596

Trust: 1.7

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6558

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96741452/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-6558

Trust: 0.8

url:http://www.asus.com

Trust: 0.3

sources: CERT/CC: VU#763843 // VULHUB: VHN-95378 // BID: 93596 // JVNDB: JVNDB-2016-009197 // CNNVD: CNNVD-201610-446 // NVD: CVE-2016-6558

CREDITS

Ian Smith.

Trust: 0.9

sources: BID: 93596 // CNNVD: CNNVD-201610-446

SOURCES

db:CERT/CCid:VU#763843
db:VULHUBid:VHN-95378
db:BIDid:93596
db:JVNDBid:JVNDB-2016-009197
db:CNNVDid:CNNVD-201610-446
db:NVDid:CVE-2016-6558

LAST UPDATE DATE

2024-11-23T22:00:28.274000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#763843date:2016-10-28T00:00:00
db:VULHUBid:VHN-95378date:2019-10-09T00:00:00
db:BIDid:93596date:2016-10-26T00:08:00
db:JVNDBid:JVNDB-2016-009197date:2018-10-02T00:00:00
db:CNNVDid:CNNVD-201610-446date:2019-10-17T00:00:00
db:NVDid:CVE-2016-6558date:2024-11-21T02:56:21.187

SOURCES RELEASE DATE

db:CERT/CCid:VU#763843date:2016-10-17T00:00:00
db:VULHUBid:VHN-95378date:2018-07-13T00:00:00
db:BIDid:93596date:2016-10-17T00:00:00
db:JVNDBid:JVNDB-2016-009197date:2018-10-02T00:00:00
db:CNNVDid:CNNVD-201610-446date:2016-10-18T00:00:00
db:NVDid:CVE-2016-6558date:2018-07-13T20:29:00.847