Vulnerability Description
A path traversal vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a file on the system to download via the file1 parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asustor | As6202T Firmware | <= adm_3.1.0.rfq3 |
| Asustor | As6202T | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2018/May/2ExploitMailing ListThird Party Advisory
- https://github.com/mefulton/asustorexploitThird Party Advisory
- https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-eExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2018/May/2ExploitMailing ListThird Party Advisory
- https://github.com/mefulton/asustorexploitThird Party Advisory
- https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-eExploitThird Party Advisory
FAQ
What is CVE-2018-11344?
CVE-2018-11344 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A path traversal vulnerability in download.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a file on the system to download via the file1 parameter.
How severe is CVE-2018-11344?
CVE-2018-11344 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11344?
Check the references section above for vendor advisories and patch information. Affected products include: Asustor As6202T Firmware, Asustor As6202T.