Description
In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-7478 | In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. |
References
History
No history.
Subscriptions
Asus
Subscribe
Ea-n66
Subscribe
Ea-n66 Firmware
Subscribe
Rp-ac52
Subscribe
Rp-ac52 Firmware
Subscribe
Rp-ac56
Subscribe
Rp-ac56 Firmware
Subscribe
Rp-n12
Subscribe
Rp-n12 Firmware
Subscribe
Rp-n14
Subscribe
Rp-n14 Firmware
Subscribe
Rp-n53
Subscribe
Rp-n53 Firmware
Subscribe
Wmp-n12
Subscribe
Wmp-n12 Firmware
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T01:36:28.591Z
Reserved: 2016-08-03T00:00:00.000Z
Link: CVE-2016-6557
No data.
Status : Modified
Published: 2018-07-13T20:29:00.817
Modified: 2024-11-21T02:56:21.063
Link: CVE-2016-6557
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD