Metrics
- CVSS v4.0 N/A
- CVSS v3.1 N/A
- CVSS v3.0 9.8 Critical
- CVSS v2 10.0 Critical
- KEV no
- EPSS 0.10612
- SSVC no
No CVSS v4.0
No CVSS v3.1
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.10612.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Asuswrt-merlin Project
Subscribe
|
Rt-ac1200
Subscribe
Rt-ac1200 Firmware
Subscribe
Rt-ac3100
Subscribe
Rt-ac3100 Firmware
Subscribe
Rt-ac3200
Subscribe
Rt-ac3200 Firmware
Subscribe
Rt-ac51u
Subscribe
Rt-ac51u Firmware
Subscribe
Rt-ac52u
Subscribe
Rt-ac52u Firmware
Subscribe
Rt-ac53
Subscribe
Rt-ac5300
Subscribe
Rt-ac5300 Firmware
Subscribe
Rt-ac53 Firmware
Subscribe
Rt-ac55u
Subscribe
Rt-ac55u Firmware
Subscribe
Rt-ac56u
Subscribe
Rt-ac56u Firmware
Subscribe
Rt-ac58u
Subscribe
Rt-ac58u Firmware
Subscribe
Rt-ac66u
Subscribe
Rt-ac66u B1
Subscribe
Rt-ac66u B1 Firmware
Subscribe
Rt-ac66u Firmware
Subscribe
Rt-ac68p
Subscribe
Rt-ac68p Firmware
Subscribe
Rt-ac68u
Subscribe
Rt-ac68u Firmware
Subscribe
Rt-ac88u
Subscribe
Rt-ac88u Firmware
Subscribe
Rt-n12\+
Subscribe
Rt-n12\+ Firmware
Subscribe
Rt-n12d1
Subscribe
Rt-n12d1 Firmware
Subscribe
Rt-n12hp
Subscribe
Rt-n12hp B1
Subscribe
Rt-n12hp B1 Firmware
Subscribe
Rt-n12hp Firmware
Subscribe
Rt-n16
Subscribe
Rt-n16 Firmware
Subscribe
Rt-n18u
Subscribe
Rt-n18u Firmware
Subscribe
Rt-n300
Subscribe
Rt-n300 Firmware
Subscribe
Rt-n56u
Subscribe
Rt-n56u Firmware
Subscribe
Rt-n66u
Subscribe
Rt-n66u Firmware
Subscribe
Rt Ac1200g
Subscribe
Rt Ac1200g Firmware
Subscribe
Rt Ac1200gu
Subscribe
Rt Ac1200gu Firmware
Subscribe
Rt Ac1900p
Subscribe
Rt Ac1900p Firmware
Subscribe
Rt N12\+ Pro
Subscribe
Rt N12\+ Pro Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
No data.
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:12:39.551Z
Reserved: 2017-07-18T00:00:00
Link: CVE-2017-11420
No data.
Status : Deferred
Published: 2017-07-18T05:29:00.470
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-11420
No data.
OpenCVE Enrichment
No data.