In ASUS RP-AC52 access points with firmware version 1.0.1.1s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/763843 | Third Party Advisory US Government Resource |
https://www.securityfocus.com/bid/93596 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
No history.
Information
Published : 2018-07-13 20:29
Updated : 2019-10-09 23:19
NVD link : CVE-2016-6557
Mitre link : CVE-2016-6557
CVE.ORG link : CVE-2016-6557
JSON object : View
Products Affected
asus
- rp-ac56_firmware
- rp-ac52_firmware
- rp-n53_firmware
- rp-n12_firmware
- wmp-n12
- rp-ac52
- rp-n14_firmware
- rp-n12
- rp-ac56
- ea-n66
- wmp-n12_firmware
- rp-n53
- ea-n66_firmware
- rp-n14
CWE
CWE-352
Cross-Site Request Forgery (CSRF)