ASUS Router 'infosvr' Remote Command Execution

Critical Nessus Plugin ID 80518

Synopsis

The remote device contains a backdoor.

Description

The remote device is an ASUS router that contains firmware which is affected by a flaw in its 'infosvr' service due to not properly checking the MAC address of a request. An unauthenticated, remote attacker, using a crafted request to UDP port 9999, can exploit this to run arbitrary commands or access configuration details (including passwords) on the device.

Solution

Contact the device vendor regarding the availability of an update.

See Also

http://www.nessus.org/u?ba42dc23

https://event.asus.com/2013/nw/ASUSWRT/

https://github.com/jduck/asus-cmd

Plugin Details

Severity: Critical

ID: 80518

File Name: asuswrt_infosvr_command_exec.nasl

Version: 1.8

Type: remote

Family: Backdoors

Published: 2015/01/14

Modified: 2018/11/15

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 9

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/o:asus:rt-ac66u_firmware, cpe:/o:asus:rt-n66u_firmware

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 2015/01/04

Exploitable With

Metasploit (ASUS infosvr Auth Bypass Command Execution)

Reference Information

CVE: CVE-2014-9583

BID: 71889

EDB-ID: 35688