CVE-2018-18320

** DISPUTED ** An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because exec.php has a popen call. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution.
References
Link Resource
http://blog.51cto.com/010bjsoft/2298828 Exploit Third Party Advisory
https://github.com/qoli/Merlin.PHP/issues/26 Exploit Third Party Advisory
http://blog.51cto.com/010bjsoft/2298828 Exploit Third Party Advisory
https://github.com/qoli/Merlin.PHP/issues/26 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac68uf_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac68uf:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac87_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac87:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac1900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac1900:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac86u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac86u:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:asuswrt-merlin_project:rt-ac2900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asuswrt-merlin_project:rt-ac2900:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () http://blog.51cto.com/010bjsoft/2298828 - Exploit, Third Party Advisory () http://blog.51cto.com/010bjsoft/2298828 - Exploit, Third Party Advisory
References () https://github.com/qoli/Merlin.PHP/issues/26 - Exploit, Third Party Advisory () https://github.com/qoli/Merlin.PHP/issues/26 - Exploit, Third Party Advisory

Information

Published : 2018-10-15 06:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-18320

Mitre link : CVE-2018-18320

CVE.ORG link : CVE-2018-18320


JSON object : View

Products Affected

asuswrt-merlin_project

  • rt-ac66u_b1
  • rt_ac1900p_firmware
  • rt-ac68uf_firmware
  • rt-ac68u
  • rt-ac56u
  • rt-ac87_firmware
  • rt-ac56u_firmware
  • rt-ac5300
  • rt-ac87
  • rt-ac86u
  • rt-ac68uf
  • rt-ac1900_firmware
  • rt-ac66u_b1_firmware
  • rt-ac88u_firmware
  • rt-ac68p
  • rt_ac1900p_
  • rt-ac3100
  • rt-ac86u_firmware
  • rt-ac68u_firmware
  • rt-ac3100_firmware
  • rt-ac5300_firmware
  • rt-ac3200_firmware
  • rt-ac1900
  • rt-ac2900
  • rt-ac68p_firmware
  • rt-ac88u
  • rt-ac2900_firmware
  • rt-ac3200