Vulnerability Name: | CVE-2018-18319 | ||||||||||||
Assigned: | 2018-10-15 | ||||||||||||
Published: | 2018-10-15 | ||||||||||||
Updated: | 2020-08-24 | ||||||||||||
Summary: | ** DISPUTED ** An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command&class=remote&Cc='ls' URI. Note: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||
References: | Source: MISC Type: Exploit, Third Party Advisory http://blog.51cto.com/010bjsoft/2298902 Source: MITRE Type: CNA CVE-2018-18319 Source: MISC Type: Exploit, Third Party Advisory https://github.com/qoli/Merlin.PHP/issues/27 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration 7: Configuration 8: Configuration 9: Configuration 10: Configuration 11: Configuration 12: Configuration 13: Configuration 14: ![]() | ||||||||||||
BACK |