CVE-2014-9583

EXPLOITED

ASUS WRT - Auth Bypass

Title source: llm

Description

common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/44524
exploitdb WORKING POC VERIFIED
by Friedrich Postelstorfer · pythonremotehardware
https://www.exploit-db.com/exploits/35688
metasploit WORKING POC EXCELLENT
by Friedrich Postelstorfer, jduck, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/misc/asus_infosvr_auth_bypass_exec.rb

Scores

EPSS 0.9105
EPSS Percentile 99.6%

Details

VulnCheck KEV 2018-07-13
CWE
CWE-264
Status published
Products (3)
asus/wrt_firmware 3.0.0.4.376.2524-g0012f52
asus/wrt_firmware 3.0.0.4.376_1071
t-mobile/tm-ac1900 3.0.0.4.376_3169
Published Jan 08, 2015
Tracked Since Feb 18, 2026