Metrics
No CVSS v4.0
No CVSS v3.1
Attack Vector Local
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction Required
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.01188.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Asuswrt-merlin Project
Subscribe
|
Rt-ac1200
Subscribe
Rt-ac1200 Firmware
Subscribe
Rt-ac3100
Subscribe
Rt-ac3100 Firmware
Subscribe
Rt-ac3200
Subscribe
Rt-ac3200 Firmware
Subscribe
Rt-ac51u
Subscribe
Rt-ac51u Firmware
Subscribe
Rt-ac52u
Subscribe
Rt-ac52u Firmware
Subscribe
Rt-ac53
Subscribe
Rt-ac5300
Subscribe
Rt-ac5300 Firmware
Subscribe
Rt-ac53 Firmware
Subscribe
Rt-ac55u
Subscribe
Rt-ac55u Firmware
Subscribe
Rt-ac56u
Subscribe
Rt-ac56u Firmware
Subscribe
Rt-ac58u
Subscribe
Rt-ac58u Firmware
Subscribe
Rt-ac66u
Subscribe
Rt-ac66u B1
Subscribe
Rt-ac66u B1 Firmware
Subscribe
Rt-ac66u Firmware
Subscribe
Rt-ac68p
Subscribe
Rt-ac68p Firmware
Subscribe
Rt-ac68u
Subscribe
Rt-ac68u Firmware
Subscribe
Rt-ac88u
Subscribe
Rt-ac88u Firmware
Subscribe
Rt-n12\+
Subscribe
Rt-n12\+ Firmware
Subscribe
Rt-n12d1
Subscribe
Rt-n12d1 Firmware
Subscribe
Rt-n12hp
Subscribe
Rt-n12hp B1
Subscribe
Rt-n12hp B1 Firmware
Subscribe
Rt-n12hp Firmware
Subscribe
Rt-n16
Subscribe
Rt-n16 Firmware
Subscribe
Rt-n18u
Subscribe
Rt-n18u Firmware
Subscribe
Rt-n300
Subscribe
Rt-n300 Firmware
Subscribe
Rt-n56u
Subscribe
Rt-n56u Firmware
Subscribe
Rt-n66u
Subscribe
Rt-n66u Firmware
Subscribe
Rt Ac1200g
Subscribe
Rt Ac1200g Firmware
Subscribe
Rt Ac1200gu
Subscribe
Rt Ac1200gu Firmware
Subscribe
Rt Ac1900p
Subscribe
Rt Ac1900p Firmware
Subscribe
Rt N12\+ Pro
Subscribe
Rt N12\+ Pro Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-2973 | Global buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to write shellcode at any address in the heap; this can be used to execute arbitrary code on the router by hosting a crafted device description XML document at a URL specified within a Location header in an SSDP response. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:05:30.580Z
Reserved: 2017-07-16T00:00:00
Link: CVE-2017-11344
No data.
Status : Deferred
Published: 2017-07-17T13:18:20.923
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-11344
No data.
OpenCVE Enrichment
No data.
EUVD