{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T04:40:13.579","vulnerabilities":[{"cve":{"id":"CVE-2016-6558","sourceIdentifier":"cret@cert.org","published":"2018-07-13T20:29:00.847","lastModified":"2024-11-21T02:56:21.187","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A command injection vulnerability exists in apply.cgi on the ASUS RP-AC52 access point, firmware version 1.0.1.1s and possibly earlier, web interface specifically in the action_script parameter. The action_script parameter specifies a script to be executed if the action_mode parameter does not contain a valid state. If the input provided by action_script does not match one of the hard coded options, then it will be executed as the argument of either a system() or an eval() call allowing arbitrary commands to be executed."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos en apply.cgi en el punto de acceso de ASUS RP-AC52 en su versión del firmware 1.0.1.1s y posiblemente anteriores, en la interfaz web; específicamente en el parámetro action_script. El parámetro action_script especifica un script para que sea ejecutado si el parámetro action_mode no contiene un estado válido. Si la entrada proporcionada por action_script no coincide con una de las opciones embebidas, se ejecutará como el argumento de una llamada system() o eval(), lo que permite que se ejecuten comandos arbitrarios."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:asus:rp-ac52_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.1.1s","matchCriteriaId":"95CD566C-50C6-4D73-BDA5-707210513B0E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:asus:rp-ac52:-:*:*:*:*:*:*:*","matchCriteriaId":"8D3F3FE0-63F5-4D0F-9C3A-C1D39B16AED1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:asus:ea-n66_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"B7C9567D-E5BA-42C9-A51A-05D431510B0B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:asus:ea-n66:-:*:*:*:*:*:*:*","matchCriteriaId":"7061553F-CA97-4021-A804-C29D1AE54AAF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:asus:rp-n12_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"9A1B21FE-3A45-48DA-91BC-9A8CD8C7BD0C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:asus:rp-n12:-:*:*:*:*:*:*:*","matchCriteriaId":"E4291D2D-4C30-4E5A-94D9-0D465C9CFD88"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:asus:rp-n14_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"BDB07468-ECC0-4A52-9BDA-A8207F467250"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:asus:rp-n14:-:*:*:*:*:*:*:*","matchCriteriaId":"F1B193A7-7C51-457C-A475-7DFF6458D4BF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:asus:rp-n53_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"C0C97695-0E2B-461F-8C08-A4E709C67A77"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:asus:rp-n53:-:*:*:*:*:*:*:*","matchCriteriaId":"39A8C124-CB6C-4F45-9C1B-0E52C59E42AD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:asus:rp-ac56_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"B2C2FAC7-3DB8-4313-8AB6-2E1E8BE66201"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:asus:rp-ac56:-:*:*:*:*:*:*:*","matchCriteriaId":"211D70E6-1FF9-4E0F-BA34-6A1329E4F01B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:asus:wmp-n12_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"AFA89FE0-E934-4519-B49C-FAAFBA26150B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:asus:wmp-n12:-:*:*:*:*:*:*:*","matchCriteriaId":"E35AD500-683F-4C96-B0CE-74029076083F"}]}]}],"references":[{"url":"https://www.kb.cert.org/vuls/id/763843","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.securityfocus.com/bid/93596","source":"cret@cert.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.kb.cert.org/vuls/id/763843","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.securityfocus.com/bid/93596","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}