ASUS Router 'infosvr' Remote Command Execution

Critical Nessus Plugin ID 80518


The remote device contains a backdoor.


The remote device is an ASUS router that contains firmware which is affected by a flaw in its 'infosvr' service due to not properly checking the MAC address of a request. An unauthenticated, remote attacker, using a crafted request to UDP port 9999, can exploit this to run arbitrary commands or access configuration details (including passwords) on the device.


Contact the device vendor regarding the availability of an update.

See Also

Plugin Details

Severity: Critical

ID: 80518

File Name: asuswrt_infosvr_command_exec.nasl

Version: $Revision: 1.4 $

Type: remote

Family: Backdoors

Published: 2015/01/14

Modified: 2016/05/19

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/o:asus:rt-ac66u_firmware, cpe:/o:asus:rt-n66u_firmware

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 2015/01/04

Reference Information

CVE: CVE-2014-9583

BID: 71889

OSVDB: 116691

EDB-ID: 35688