CVE-2018-18319

** DISPUTED ** An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command&class=remote&Cc='ls' URI. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution.
References
Link Resource
http://blog.51cto.com/010bjsoft/2298902 Exploit Third Party Advisory
https://github.com/qoli/Merlin.PHP/issues/27 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac68uf_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac68uf:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac87_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac87:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac1900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac1900:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac86u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac86u:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac2900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac2900:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-10-15 06:29

Updated : 2024-08-05 11:15


NVD link : CVE-2018-18319

Mitre link : CVE-2018-18319

CVE.ORG link : CVE-2018-18319


JSON object : View

Products Affected

asuswrt-merlin_project

  • rt-ac2900
  • rt-ac66u_b1
  • rt-ac56u
  • rt-ac66u_b1_firmware
  • rt-ac86u
  • rt-ac68u_firmware
  • rt-ac5300_firmware
  • rt-ac68p
  • rt-ac68uf_firmware
  • rt_ac1900p_firmware
  • rt-ac86u_firmware
  • rt-ac88u_firmware
  • rt-ac68u
  • rt-ac87
  • rt-ac88u
  • rt-ac3100
  • rt-ac3200_firmware
  • rt_ac1900p_
  • rt-ac3100_firmware
  • rt-ac5300
  • rt-ac87_firmware
  • rt-ac1900_firmware
  • rt-ac68uf
  • rt-ac56u_firmware
  • rt-ac2900_firmware
  • rt-ac3200
  • rt-ac1900
  • rt-ac68p_firmware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')