APP: Asus Write Infosvr Service Remote Command Execution

This signature detects attempts to exploit a known vulnerability against Asus. A successful exploit can lead to remote command execution.

Extended Description

common.c in infosvr in ASUS WRT firmware 3.0.0.4.376_1071, 3.0.0.376.2524-g0013f52, and other versions, as used in RT-AC66U, RT-N66U, and other routers, does not properly check the MAC address for a request, which allows remote attackers to bypass authentication and execute arbitrary commands via a NET_CMD_ID_MANU_CMD packet to UDP port 9999. NOTE: this issue was incorrectly mapped to CVE-2014-10000, but that ID is invalid due to its use as an example of the 2014 CVE ID syntax change.

Affected Products

T-mobile tm-ac1900

References

CVE: CVE-2014-9583

Short Name
APP:ASUS-WRT-INFOSVR-COMND-EXEC
Severity
Major
Recommended
True
Recommended Action
Drop
Category
APP
Keywords
Asus CVE-2014-9583 Command Execution Infosvr Remote Service Write
Release Date
04/20/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
Port
UDP/9999
False Positive
Unknown
Vendors

T-mobile

Found a potential security threat?