cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-37315,https://securityvulnerability.io/vulnerability/CVE-2021-37315,Improper Access Control in ASUS RT-AC68U Router Firmware,"A vulnerability exists within the ASUS RT-AC68U router firmware, enabling remote attackers to exploit improper sanitation in COPY and MOVE operations. This misconfiguration permits unauthorized file writing, which could lead to further compromises of the system. Regular updates and proper configuration are essential to mitigate potential risks associated with this vulnerability.",Asus,Rt-ac68u Firmware,9.1,CRITICAL,0.0023900000378489494,false,false,false,false,,false,false,2023-02-03T00:00:00.000Z,0 CVE-2021-37316,https://securityvulnerability.io/vulnerability/CVE-2021-37316,SQL Injection Flaw in ASUS RT-AC68U Router Firmware,"The ASUS RT-AC68U router has an SQL injection vulnerability in its Cloud Disk feature, present in firmware versions prior to 3.0.0.4.386.41634. This flaw allows remote attackers to execute unauthorized SQL queries, which can lead to the exposure of sensitive information, including user credentials stored in the /etc/shadow file. Such a compromise can significantly undermine the privacy and security of the users relying on this device for their network connectivity.",Asus,Rt-ac68u Firmware,7.5,HIGH,0.0014900000533089042,false,false,false,false,,false,false,2023-02-03T00:00:00.000Z,0 CVE-2021-37317,https://securityvulnerability.io/vulnerability/CVE-2021-37317,Directory Traversal Vulnerability in ASUS RT-AC68U Router Firmware,"A directory traversal vulnerability exists in the Cloud Disk feature of ASUS RT-AC68U router firmware versions prior to 3.0.0.4.386.41634. This flaw enables remote attackers to exploit improper sanitization in COPY and MOVE operations, allowing them to write arbitrary files on the device. This can lead to unauthorized access and manipulation of sensitive system files, compromising the integrity and security of the device and potentially the network it operates within.",Asus,Rt-ac68u Firmware,9.1,CRITICAL,0.002409999957308173,false,false,false,false,,false,false,2023-02-03T00:00:00.000Z,0 CVE-2021-45757,https://securityvulnerability.io/vulnerability/CVE-2021-45757,,"ASUS AC68U <=3.0.0.4.385.20852 is affected by a buffer overflow in blocking.cgi, which may cause a denial of service (DoS).",Asus,Rt-ac68u Firmware,7.5,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2022-03-23T10:55:27.000Z,0 CVE-2021-45756,https://securityvulnerability.io/vulnerability/CVE-2021-45756,,Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.,Asus,Rt-ac68u Firmware,9.8,CRITICAL,0.003060000017285347,false,false,false,false,,false,false,2022-03-23T10:49:10.000Z,0 CVE-2014-2719,https://securityvulnerability.io/vulnerability/CVE-2014-2719,,"Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code.",Asus,"Rt-ac66u Firmware,Rt-ac68u Firmware,Rt-n10e Firmware,Rt-n14u Firmware,Rt-n16 Firmware,Rt-n56u Firmware,Rt-n65u Firmware,Rt-n66u Firmware,Rt-ac68u",,,0.0016899999463930726,false,false,false,false,,false,false,2014-04-22T13:06:00.000Z,0