CVE-2018-8826

high-risk
Published 2018-04-20

ASUS RT-AC51U, RT-AC58U, RT-AC66U, RT-AC1750, RT-ACRH13, and RT-N12 D1 routers with firmware before 3.0.0.4.380.8228; RT-AC52U B1, RT-AC1200 and RT-N600 routers with firmware before 3.0.0.4.380.10446; RT-AC55U and RT-AC55UHP routers with firmware before 3.0.0.4.382.50276; RT-AC86U and RT-AC2900 routers with firmware before 3.0.0.4.384.20648; and possibly other RT-series routers allow remote attackers to execute arbitrary code via unspecified vectors.

Do I need to act?

~
5.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (13)

Rt-Ac51U Firmware
Rt-Ac58U Firmware
Rt-Ac1750 Firmware
Rt-N12 D1 Firmware
Rt-Ac52U B1 Firmware
Rt-Ac1200 Firmware
Rt-N600 Firmware
Rt-Ac55U Firmware
Rt-Ac55Uhp Firmware
Rt-Ac86U Firmware
Rt-Acrh13 Firmware
Rt-Ac2900 Firmware

Affected Vendors

References (28)

and 8 more references
57
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 8/34 · Low
Exposure 17/34 · Moderate