cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-39086,https://securityvulnerability.io/vulnerability/CVE-2023-39086,Information Disclosure in ASUS RT-AC66U B1 Router,"The ASUS RT-AC66U B1 router has a vulnerability resulting in the transmission of sensitive information in an unencrypted cleartext format. This flaw could allow unauthorized access to private data, particularly in environments where network security is not adequately enforced. Users operating this model should implement immediate measures to secure sensitive data and update configurations to mitigate exposure risks.",Asus,Rt-ac66u B1 Firmware,7.5,HIGH,0.001120000029914081,false,,false,false,false,,,false,false,,2023-08-08T00:00:00.000Z,0 CVE-2020-7997,https://securityvulnerability.io/vulnerability/CVE-2020-7997,Cross-Site Scripting Vulnerability in ASUS WRT-AC66U Router,"The ASUS WRT-AC66U router is susceptible to a Cross-Site Scripting vulnerability via the Client Name field within its Parental Control feature. This flaw allows an attacker to inject malicious scripts, potentially compromising the device and exposing users to various security threats. Proper sanitization and validation of input fields are crucial to mitigating the risk associated with this vulnerability.",Asus,Rt-ac66u Firmware,6.1,MEDIUM,0.0013000000035390258,false,,false,false,false,,,false,false,,2020-01-28T04:33:24.000Z,0 CVE-2018-8879,https://securityvulnerability.io/vulnerability/CVE-2018-8879,Remote Code Execution Vulnerability in ASUS Firmware for Networking Devices,"A stack-based buffer overflow exists in the ASUSwrt-Merlin firmware utilized in several ASUS networking devices. This vulnerability arises when the system processes overly long input strings directed at the blocking.asp page through GET or POST requests. Key parameters susceptible to this flaw include flag, mac, and cat_id, enabling remote attackers to potentially execute arbitrary code, thereby compromising device integrity and user security.",Asus,Rt-ac66u Firmware,9.8,CRITICAL,0.0385500006377697,false,,false,false,false,,,false,false,,2019-11-21T15:26:03.000Z,0 CVE-2013-4656,https://securityvulnerability.io/vulnerability/CVE-2013-4656,Symlink Traversal Vulnerability in ASUS RT-AC66U and RT-N56U Routers,"A symlink traversal vulnerability exists in the ASUS RT-AC66U and RT-N56U routers due to improper configuration of the SMB service. This flaw could allow an attacker to traverse the filesystem and access restricted areas, potentially exposing sensitive data or enabling further exploits. Proper configuration and regular security assessments are critical to mitigate the risks associated with this vulnerability.",Asus,Rt-ac66u Firmware,9.8,CRITICAL,0.0029100000392645597,false,,false,false,false,,,false,false,,2019-11-13T14:44:05.000Z,0 CVE-2018-9285,https://securityvulnerability.io/vulnerability/CVE-2018-9285,,"Main_Analysis_Content.asp in /apply.cgi on ASUS RT-AC66U, RT-AC68U, RT-AC86U, RT-AC88U, RT-AC1900, RT-AC2900, and RT-AC3100 devices before 3.0.0.4.384_10007; RT-N18U devices before 3.0.0.4.382.39935; RT-AC87U and RT-AC3200 devices before 3.0.0.4.382.50010; and RT-AC5300 devices before 3.0.0.4.384.20287 allows OS command injection via the pingCNT and destIP fields of the SystemCmd variable.",Asus,Rt-ac66u Firmware,9.8,CRITICAL,0.013279999606311321,false,,false,false,false,,,false,false,,2018-04-04T19:00:00.000Z,0 CVE-2013-4659,https://securityvulnerability.io/vulnerability/CVE-2013-4659,,Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a long string to TCP port 5916. This component is used on routers of multiple vendors including ASUS RT-AC66U and TRENDnet TEW-812DRU.,Asus,Rt-ac66u Firmware,9.8,CRITICAL,0.022630000486969948,false,,false,false,false,,,false,false,,2017-03-14T09:02:00.000Z,0 CVE-2014-2719,https://securityvulnerability.io/vulnerability/CVE-2014-2719,,"Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.",Asus,"Rt-ac66u Firmware,Rt-ac68u Firmware,Rt-n10e Firmware,Rt-n14u Firmware,Rt-n16 Firmware,Rt-n56u Firmware,Rt-n65u Firmware,Rt-n66u Firmware,Rt-ac68u",,,0.0016899999463930726,false,,false,false,false,,,false,false,,2014-04-22T13:06:00.000Z,0 CVE-2013-4937,https://securityvulnerability.io/vulnerability/CVE-2013-4937,,"Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors.",Asus,"Rt-ac66u Firmware,Rt-ac66u",,,0.0024399999529123306,false,,false,false,false,,,false,false,,2013-07-26T12:05:00.000Z,0