![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.808240 |
Category: | Web application abuses |
Title: | ASUS DSL-N55U Router Multiple Vulnerabilities (Jun 2016) - Active Check |
Summary: | ASUS DSL-N55U Router is prone to multiple vulnerabilities. |
Description: | Summary: ASUS DSL-N55U Router is prone to multiple vulnerabilities. Vulnerability Insight: The following vulnerabilities exist: - An insufficient validation of user supplied input for the 'web path' in the 'httpd' binary, which redirect a user to the 'cloud_sync.asp' page with the web path as a value of a GET parameter. - An unauthenticated access to DHCP information of the local machines connected to the router from the WAN IP address. Vulnerability Impact: Successful exploitation will allow remote attackers to inject arbitrary web script into user's browser session and also to retrieve DHCP information including the hostname and private IP addresses of the local machines. Affected Software/OS: ASUS DSL-N55U router firmware version 3.0.0.4.376_2736. Solution: Update to version 3.0.0.4_380_3679 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |