Check CVE Id
Check CWE Id
Cross-site scripting (XSS) vulnerability on ASUS GT-AC5300 devices with firmware through 184.108.40.206.384_32738 allows remote attackers to inject arbitrary web script or HTML via the appGet.cgi hook parameter.
(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
CVSS Base Score
Cross-site request forgery (CSRF) vulnerability on ASUS GT-AC5300 routers with firmware through 220.127.116.11.384_32738 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via a request...
Stack-based buffer overflow on the ASUS GT-AC5300 router through 18.104.22.168.384_32738 allows remote attackers to cause a denial of service (device crash) or possibly have unspecified other impact by setting a long sh_path0 value and then sending an appG...
ASUS GT-AC5300 devices with firmware through 22.214.171.124.384_32738 allow remote attackers to cause a denial of service via a single "GET / HTTP/1.1\r\n" line.
Cross-site request forgery (CSRF) vulnerability in WL-330NUL Firmware version prior to 126.96.36.199 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
Main_Analysis_Content.asp in ASUS DSL-N12E_C1 188.8.131.52_345 is prone to Authenticated Remote Command Execution, which allows a remote attacker to execute arbitrary OS commands via service parameters, such as shell metacharacters in the destIP parameter...
ASUS HG100 devices allow denial of service via an IPv4 packet flood.
A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 184.108.40.206s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be ex...
In ASUS RP-AC52 access points with firmware version 220.127.116.11s and possibly earlier, the web interface, the web interface does not sufficiently verify whether a valid request was intentionally provided by the user. An attacker can perform actions with ...
Back to Top