A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.

Project Subscriptions

Vendors Products
Ea-n66 Firmware Subscribe
Rp-ac52 Subscribe
Rp-ac52 Firmware Subscribe
Rp-ac56 Subscribe
Rp-ac56 Firmware Subscribe
Rp-n12 Firmware Subscribe
Rp-n14 Firmware Subscribe
Rp-n53 Firmware Subscribe
Wmp-n12 Subscribe
Wmp-n12 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2016-7479 A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T01:36:28.511Z

Reserved: 2016-08-03T00:00:00

Link: CVE-2016-6558

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-13T20:29:00.847

Modified: 2024-11-21T02:56:21.187

Link: CVE-2016-6558

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses