CVE-2014-9583
EXPLOITEDASUS WRT - Auth Bypass
Title source: llmDescription
common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/44524
exploitdb
WORKING POC
VERIFIED
by Friedrich Postelstorfer · pythonremotehardware
https://www.exploit-db.com/exploits/35688
metasploit
WORKING POC
EXCELLENT
by Friedrich Postelstorfer, jduck, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/asus_infosvr_auth_bypass_exec.rb
References (5)
Scores
EPSS
0.9105
EPSS Percentile
99.6%
Details
VulnCheck KEV
2018-07-13
CWE
CWE-264
Status
published
Products (3)
asus/wrt_firmware
3.0.0.4.376.2524-g0012f52
asus/wrt_firmware
3.0.0.4.376_1071
t-mobile/tm-ac1900
3.0.0.4.376_3169
Published
Jan 08, 2015
Tracked Since
Feb 18, 2026