Vulnerability Description
Improper administrator IP validation after his login in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allows an unauthorized user to execute any action knowing administrator session token by using a specific User-Agent string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asus | Asuswrt | <= 3.0.0.4.380.7743 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-HiThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2018/Jan/63Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/145921/ASUSWRT-3.0.0.4.382.18495-Session-HiThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2018/Jan/63Mailing ListThird Party Advisory
FAQ
What is CVE-2017-15653?
CVE-2017-15653 is a vulnerability with a CVSS score of 8.8 (HIGH). Improper administrator IP validation after his login in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allows an unauthorized user to execute any action knowing adminis...
How severe is CVE-2017-15653?
CVE-2017-15653 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15653?
Check the references section above for vendor advisories and patch information. Affected products include: Asus Asuswrt.