Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-9285

Severity
9.8CRITICAL
EPSS
2.8%
top 13.88%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 4
Latest updateMay 13

Description

Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages11 packages

NVDasus/rt-n18u_firmware< 3.0.0.4.382.39935
NVDasus/rt-ac66u_firmware< 3.0.0.4.384.10007
NVDasus/rt-ac68u_firmware< 3.0.0.4.384.10007
NVDasus/rt-ac86u_firmware< 3.0.0.4.384.10007
NVDasus/rt-ac87u_firmware< 3.0.0.4.382.50010

🔴Vulnerability Details

3
GHSA
GHSA-8g7r-fwgg-5qfg: Main_Analysis_Content2022-05-13
CVEList
CVE-2018-9285: Main_Analysis_Content2018-04-04
VulnCheck
ASUS rt-ac66u_firmware Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')2018

💥Exploits & PoCs

1
Exploit-DB
ASUS TM-AC1900 - Arbitrary Command Execution (Metasploit)2020-11-13