{"id": "CVE-2017-11344", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2017-07-17T13:18:20.923", "references": [{"url": "http://www.openwall.com/lists/oss-security/2017/07/14/3", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://asuswrt.lostrealm.ca/changelog", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Global buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to write shellcode at any address in the heap; this can be used to execute arbitrary code on the router by hosting a crafted device description XML document at a URL specified within a Location header in an SSDP response."}, {"lang": "es", "value": "Un Desbordamiento de b\u00fafer global en networkmap en el firmware Asuswrt-Merlin para dispositivos ASUS y en el firmware ASUS para dispositivos RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 de ASUS, permiten a los atacantes remotos escribir c\u00f3digo shell en cualquier direcci\u00f3n de la pila; esto puede ser utilizado para ejecutar c\u00f3digo arbitrario en el enrutador mediante el alojamiento de un documento XML creado de descripci\u00f3n de dispositivo en una URL especificada dentro de un encabezado Location en una respuesta SSDP."}], "lastModified": "2017-12-20T02:29:02.660", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4D88DAF-DFC0-4272-92E8-92B8B720ABC2", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B85195C1-D431-47A3-B740-84B9E97E6A97"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC02A03-C4AA-4A88-A4C5-B28851820640", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "879F2C62-40D6-47C7-B08D-EF394C184141"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92F02BF7-4804-4088-974A-850BE8753637", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4A532686-2867-4960-979B-7B91CB403F56"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5976A71-B3A0-41EA-ACCA-FC7DDE42A288", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC9024B4-BF99-4002-8550-24DA6BE94013"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8A15254-7453-4DF2-9EAC-4D13FD11AF05", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D3348D32-AA0C-4249-B507-1A46DF5A62F6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F4FEB77-CD0D-4313-BB03-9DD480A7971C", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac66u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7AC93B36-B0B3-4557-812A-042E6ADC3EA2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BE5C7A7-D210-4CA0-9391-FF1BF640F1AD", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21F533CF-447F-4BA8-B01E-F6E8290D768C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac58u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7116534C-8FC3-49C0-8911-F0160FFC6CB9", "versionEndIncluding": "3.0.0.4.380.7485"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac58u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E770C7D6-5403-455F-BCBF-C56E21CBCD40"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4F02DDE-A0EF-4A07-BEBA-C41E99FDDCE8", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A9E7631A-AD48-4AFA-8F7D-E39578F492ED"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac55u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "858F993B-494F-4CD0-AEEA-9C96505A7460", "versionEndIncluding": "3.0.0.4.380.7378"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac55u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "883E9C34-65D6-4D2C-9D60-A173575247B9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac52u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CA2E840-7343-40A0-A32D-455E950DAAD3", "versionEndIncluding": "3.0.0.4.380.4180"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac52u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6F9DDB3B-0765-4A69-9190-FF132630F291"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac51u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67A02F10-D8C4-49E1-A6DD-C7E0600F3C49", "versionEndIncluding": "3.0.0.4.380.7378"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac51u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91207A19-15F3-476A-8136-08665E10119D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n18u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4F031C0-ED90-4470-8DEA-F22CB081C22E", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n18u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "625C1795-2197-461F-9880-523CEB436B9A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n66u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FD21108-18FA-4545-8712-0EDD6DA40C12", "versionEndIncluding": "3.0.0.4.380.7378"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n66u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "474CEA6E-1F80-4A10-B750-7F47C94629E3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n56u_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE9EBB70-B4A6-4F9D-A9C7-32620E2D2735", "versionEndIncluding": "3.0.0.4.378.7177"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n56u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AB0C2572-667F-4BDE-B296-1B4210E351FB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EDDCCBF-FD1A-4EE1-9B2D-9E11D4417D9A", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4BC4D044-4850-465D-B1DA-ED734BCC5277"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "052CE11F-FF92-452D-8A3A-3651A303F100", "versionEndIncluding": "3.0.0.4.380.7743"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "30E15ED3-C71D-402D-B879-B4CA5D5B3525"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt_ac1200gu_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00F54F3B-C7D0-49C9-B6C0-9AD2EC53C2EE", "versionEndIncluding": "3.0.0.4.380.5577"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt_ac1200gu:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "23171DFA-6307-4078-BBB7-4E8EA904131F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt_ac1200g_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "974F507C-A577-424B-A332-CC4EE3442E04", "versionEndIncluding": "3.0.0.4.380.3167"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt_ac1200g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D58B6588-9F8F-48B9-9EE0-209BBFE0C9CB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac1200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C9311D4-A79F-4EDD-9442-6D87A1AE4D71", "versionEndIncluding": "3.0.0.4.380.9880"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac1200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "25606A77-1489-4624-8759-20DEC679E5E9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-ac53_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49F94A48-EE6E-49F5-A673-229A42967EF4", "versionEndIncluding": "3.0.0.4.380.9883"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-ac53:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "75CE8587-6DF9-4AB4-A2D8-F45D52D86419"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97E8B7EB-6CCA-4D17-8851-8C762FC9D6C8", "versionEndIncluding": "3.0.0.4.380.2943"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n12hp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F166B64F-2A6E-404C-AD3F-337D631043F3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_b1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E92F296-E91F-4B61-8D9F-F3CADD8CBB0E", "versionEndIncluding": "3.0.0.4.380.3479"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n12hp_b1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "25CCFDE4-B93B-4149-BB2F-EC113F316876"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n12d1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F3394D8-B251-444F-9CCB-2DC4C5F925EA", "versionEndIncluding": "3.0.0.4.380.7378"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n12d1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "18926678-B568-4B23-8882-877ECB802D90"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n12\\+_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C9D353C-C88E-4772-83A4-BA2774D1296D", "versionEndIncluding": "3.0.0.4.380.7378"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n12\\+:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "44800173-189F-45D7-A8D0-0DFF3BA02488"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt_n12\\+_pro_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC8FF40-47DF-4D08-98FF-09A9D51E8220", "versionEndIncluding": "3.0.0.4.380.9880"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt_n12\\+_pro:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB403995-31CF-4468-9245-205EF4FE309A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n16_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4733E9E4-B297-4AF5-AEBA-C87D5E62FE62", "versionEndIncluding": "3.0.0.4.380.7378"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n16:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1708CE7D-7096-4846-A143-F248D5F25B15"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:asuswrt-merlin_project:rt-n300_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00790F60-6870-47AE-B779-B8DF3DF5D2CD", "versionEndIncluding": "3.0.0.4.380.7378"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:asuswrt-merlin_project:rt-n300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5F266FCC-AC0C-4802-946E-3E4302E0A834"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}