Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:rp-ac52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95CD566C-50C6-4D73-BDA5-707210513B0E", "versionEndIncluding": "1.0.1.1s", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:rp-ac52:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D3F3FE0-63F5-4D0F-9C3A-C1D39B16AED1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:ea-n66_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7C9567D-E5BA-42C9-A51A-05D431510B0B", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:ea-n66:-:*:*:*:*:*:*:*", "matchCriteriaId": "7061553F-CA97-4021-A804-C29D1AE54AAF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:rp-n12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A1B21FE-3A45-48DA-91BC-9A8CD8C7BD0C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:rp-n12:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4291D2D-4C30-4E5A-94D9-0D465C9CFD88", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:rp-n14_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDB07468-ECC0-4A52-9BDA-A8207F467250", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:rp-n14:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B193A7-7C51-457C-A475-7DFF6458D4BF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:rp-n53_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C97695-0E2B-461F-8C08-A4E709C67A77", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:rp-n53:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A8C124-CB6C-4F45-9C1B-0E52C59E42AD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:rp-ac56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C2FAC7-3DB8-4313-8AB6-2E1E8BE66201", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:rp-ac56:-:*:*:*:*:*:*:*", "matchCriteriaId": "211D70E6-1FF9-4E0F-BA34-6A1329E4F01B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:wmp-n12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFA89FE0-E934-4519-B49C-FAAFBA26150B", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:wmp-n12:-:*:*:*:*:*:*:*", "matchCriteriaId": "E35AD500-683F-4C96-B0CE-74029076083F", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed."}, {"lang": "es", "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos en apply.cgi en el punto de acceso de ASUS RP-AC52 en su versi\u00f3n del firmware 1.0.1.1s y posiblemente anteriores, en la interfaz web; espec\u00edficamente en el par\u00e1metro action_script. El par\u00e1metro action_script especifica un script para que sea ejecutado si el par\u00e1metro action_mode no contiene un estado v\u00e1lido. Si la entrada proporcionada por action_script no coincide con una de las opciones embebidas, se ejecutar\u00e1 como el argumento de una llamada system() o eval(), lo que permite que se ejecuten comandos arbitrarios."}], "id": "CVE-2016-6558", "lastModified": "2024-11-21T02:56:21.187", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-07-13T20:29:00.847", "references": [{"source": "cret@cert.org", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://www.kb.cert.org/vuls/id/763843"}, {"source": "cret@cert.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "https://www.securityfocus.com/bid/93596"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://www.kb.cert.org/vuls/id/763843"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "https://www.securityfocus.com/bid/93596"}], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-77"}], "source": "cret@cert.org", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-77"}], "source": "nvd@nist.gov", "type": "Primary"}]}