Vulnerability Name:

CVE-2013-5948 (CCN-103065)

Assigned:2013-09-27
Published:2013-09-27
Updated:2016-06-30
Summary:The Network Analysis tab (Main_Analysis_Content.asp) in the ASUS RT-AC68U and other RT series routers with firmware before 3.0.0.4.374.5047 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the Target field (destIP parameter).
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:8.5 High (CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C)
6.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-78
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2013-5948

Source: CCN
Type: Full Disclosure Mailing List, Fri, 4 Apr 2014 15:08:49 -0300
Reflected Cross-Site Scripting within the ASUS RT-AC68U Managing Web Interface

Source: FULLDISC
Type: UNKNOWN
20140404 Reflected Cross-Site Scripting within the ASUS RT-AC68U Managing Web Interface

Source: CCN
Type: Full Disclosure Mailing List, Fri, 4 Apr 2014 17:25:02 -0400
Remote Command Execution within the ASUS RT-AC68U Managing Web Interface

Source: FULLDISC
Type: Exploit
20140404 Re: Remote Command Execution within the ASUS RT-AC68U Managing Web Interface

Source: CONFIRM
Type: UNKNOWN
http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29

Source: CCN
Type: ASUS Web site
ASUS

Source: CCN
Type: BID-67672
ASUS RT Series Routers 'Main_Analysis_Content.asp' Remote Command Execution Vulnerability

Source: XF
Type: UNKNOWN
asus-rtac68u-cve20135948-cmd-exec(103065)

Source: CONFIRM
Type: UNKNOWN
https://support.t-mobile.com/docs/DOC-21994

Vulnerable Configuration:Configuration 1:
  • cpe:/o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:asus:rt-ac68u_firmware:3.0.0.4.374.4755:*:*:*:*:*:*:*
  • OR cpe:/o:asus:rt-ac68u_firmware:3.0.0.4.374_4561:*:*:*:*:*:*:*
  • OR cpe:/o:asus:rt-ac68u_firmware:3.0.0.4.374_4887:*:*:*:*:*:*:*
  • AND
  • cpe:/h:asus:rt-ac68u:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:asus:rt-ac68u:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    t-mobile tm-ac1900 3.0.0.4.376_3169
    asus rt-ac68u firmware 3.0.0.4.374.4755
    asus rt-ac68u firmware 3.0.0.4.374_4561
    asus rt-ac68u firmware 3.0.0.4.374_4887
    asus rt-ac68u -
    asus rt-ac68u *