CVE-2013-3610
Published Oct 5, 2013
Last updated 11 years ago
Overview
- Description
- qis/QIS_finish.htm on the ASUS RT-N10E router with firmware before 2.0.0.25 does not require authentication, which allows remote attackers to discover the administrator password via a direct request.
- Source
- cret@cert.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.1
- Impact score
- 6.9
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5653E47A-FE04-45F5-9218-021C10B7FD45", "versionEndIncluding": "2.0.0.24" }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEB012B3-5C57-4310-8F1A-208D2E470A6C" }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F1D15BC-D83F-4949-863B-817FA2A0A23D" }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0ACDCE11-5422-4AB1-AC89-3C3DF05FDE1C" }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C7607C5-EF0C-40FA-BADA-2316BA4A5E41" }, { "criteria": "cpe:2.3:o:asus:rt-n10e_firmware:2.0.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "340D98A2-2018-4A24-B654-3A7032FCE518" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n10e:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AFCC588-AAA6-45FA-8D1F-E57C7693D27A" } ], "operator": "OR" } ], "operator": "AND" } ]