National Vulnerability Database

National Vulnerability Database

National Vulnerability

Search Results (Refine Search)

Search Parameters:
  • Contains Software Flaws (CVE)
  • CPE Product Version: cpe:/h:asus:rt-ac66u:-
There are 7 matching records.
Vuln ID Summary CVSS Severity

ASUS RT-AC51U, RT-AC58U, RT-AC66U, RT-AC1750, RT-ACRH13, and RT-N12 D1 routers with firmware before; RT-AC52U B1, RT-AC1200 and RT-N600 routers with firmware before; RT-AC55U and RT-AC55UHP routers with firmware before; RT-AC86U and RT-AC2900 routers with firmware before; and possibly other RT-series routers allow remote attackers to execute arbitrary code via unspecified vectors.

Published: April 20, 2018; 04:29:00 PM -04:00
V3.0: 9.8 CRITICAL
    V2: 7.5 HIGH

Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before; RT-N18U devices before; RT-AC87U and RT-AC3200 devices before; and RT-AC5300 devices before allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.

Published: April 04, 2018; 03:29:00 PM -04:00
V3.0: 9.8 CRITICAL
    V2: 10.0 HIGH

Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU.

Published: March 14, 2017; 05:59:00 AM -04:00
V3.0: 9.8 CRITICAL
    V2: 10.0 HIGH

common.c in infosvr in ASUS WRT firmware,, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.

Published: January 08, 2015; 03:59:02 PM -05:00
    V2: 10.0 HIGH

ASUS RT-AC68U, RT-AC66R, RT-AC66U, RT-AC56R, RT-AC56U, RT-N66R, RT-N66U, RT-N56R, RT-N56U, and possibly other RT-series routers before firmware do not verify the integrity of firmware (1) update information or (2) downloaded updates, which allows man-in-the-middle (MITM) attackers to execute arbitrary code via a crafted image.

Published: November 04, 2014; 05:55:06 PM -05:00
    V2: 7.1 HIGH

Multiple buffer overflows in web.c in httpd on the ASUS RT-N56U and RT-AC66U routers with firmware allow remote attackers to execute arbitrary code via the (1) apps_name or (2) apps_flag parameter to APP_Installation.asp.

Published: January 22, 2014; 12:22:12 AM -05:00
    V2: 10.0 HIGH

Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before have unknown impact and attack vectors.

Published: July 26, 2013; 08:05:40 AM -04:00
    V2: 10.0 HIGH