Description
Cross-site scripting (XSS) vulnerability in Advanced_Wireless_Content.asp in ASUS RT-AC68U and other RT series routers with firmware before 3.0.0.4.374.5047 allows remote attackers to inject arbitrary web script or HTML via the current_page parameter to apply.cgi.
Affected Software
{"id": "CVE-2014-2925", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2014-2925", "description": "Cross-site scripting (XSS) vulnerability in Advanced_Wireless_Content.asp in ASUS RT-AC68U and other RT series routers with firmware before 3.0.0.4.374.5047 allows remote attackers to inject arbitrary web script or HTML via the current_page parameter to apply.cgi.", "published": "2014-04-22T13:06:00", "modified": "2016-06-30T16:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2925", "reporter": "cve@mitre.org", "references": ["http://seclists.org/fulldisclosure/2014/Apr/59", "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29", "http://www.asus.com/Networking/RTAC68U/HelpDesk_Download/", "http://www.securityfocus.com/bid/66669", "https://support.t-mobile.com/docs/DOC-21994"], "cvelist": ["CVE-2014-2925"], "immutableFields": [], "lastseen": "2023-02-09T10:08:16", "viewCount": 11, "enchantments": {"dependencies": {}, "score": {"value": 4.2, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "epss": [{"cve": "CVE-2014-2925", "epss": "0.002730000", "percentile": "0.629600000", "modified": "2023-03-13"}], "vulnersScore": 4.2}, "_state": {"dependencies": 1675937482, "score": 1675937475, "affected_software_major_version": 1676295084, "epss": 1678769680}, "_internal": {"score_hash": "cfbeeb84b18f2f218634b8602eaa7465"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/o:t-mobile:tm-ac1900:3.0.0.4.376_3169", "cpe:/o:asus:rt-ac68u_firmware:3.0.0.4.374.4755", "cpe:/o:asus:rt-ac68u_firmware:3.0.0.4.374_4983", "cpe:/h:asus:rt-ac68u:-", "cpe:/o:asus:rt-ac68u_firmware:3.0.0.4.374_4887"], "cpe23": ["cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374.4755:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4983:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4887:*:*:*:*:*:*:*", "cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*"], "cwe": ["CWE-79"], "affectedSoftware": [{"cpeName": "t-mobile:tm-ac1900", "version": "3.0.0.4.376_3169", "operator": "eq", "name": "t-mobile tm-ac1900"}, {"cpeName": "asus:rt-ac68u_firmware", "version": "3.0.0.4.374_4983", "operator": "le", "name": "asus rt-ac68u firmware"}, {"cpeName": "asus:rt-ac68u_firmware", "version": "3.0.0.4.374.4755", "operator": "eq", "name": "asus rt-ac68u firmware"}, {"cpeName": "asus:rt-ac68u_firmware", "version": "3.0.0.4.374_4887", "operator": "eq", "name": "asus rt-ac68u firmware"}, {"cpeName": "asus:rt-ac68u", "version": "-", "operator": "eq", "name": "asus rt-ac68u"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:*", "cpe_name": []}]}, {"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4983:*:*:*:*:*:*:*", "versionEndIncluding": "3.0.0.4.374_4983", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374.4755:*:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.374_4887:*:*:*:*:*:*:*", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "http://seclists.org/fulldisclosure/2014/Apr/59", "name": "20140404 Reflected Cross-Site Scripting within the ASUS RT-AC68U Managing Web Interface", "refsource": "FULLDISC", "tags": ["Exploit"]}, {"url": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29", "name": "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29", "refsource": "CONFIRM", "tags": []}, {"url": "http://www.asus.com/Networking/RTAC68U/HelpDesk_Download/", "name": "http://www.asus.com/Networking/RTAC68U/HelpDesk_Download/", "refsource": "CONFIRM", "tags": []}, {"url": "http://www.securityfocus.com/bid/66669", "name": "66669", "refsource": "BID", "tags": ["Exploit"]}, {"url": "https://support.t-mobile.com/docs/DOC-21994", "name": "https://support.t-mobile.com/docs/DOC-21994", "refsource": "CONFIRM", "tags": []}], "product_info": [{"vendor": "Asus", "product": "Rt-ac68u"}, {"vendor": "Asus", "product": "Rt-ac68u_firmware"}, {"vendor": "T-mobile", "product": "Tm-ac1900"}]}
{}