CVE-2018-9285
high-risk
Published 2018-04-04
Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.
Do I need to act?
~
2.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (11)
Rt-Ac68U Firmware
Rt-Ac86U Firmware
Rt-Ac88U Firmware
Rt-Ac1900 Firmware
Rt-Ac2900 Firmware
Rt-Ac3100 Firmware
Rt-N18U Firmware
Rt-Ac87U Firmware
Rt-Ac3200 Firmware
Rt-Ac5300 Firmware
Affected Vendors
References (6)
Third Party Advisory
https://fortiguard.com/zeroday/FG-VD-17-216
Third Party Advisory
https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerab...
Third Party Advisory
https://fortiguard.com/zeroday/FG-VD-17-216
Third Party Advisory
https://www.fortinet.com/blog/threat-research/fortiguard-labs-discovers-vulnerab...
54
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
16/34 · Moderate