An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command&class=remote&Cc='ls' URI. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution
References
Link Resource
http://blog.51cto.com/010bjsoft/2298902 Exploit Third Party Advisory
https://github.com/qoli/Merlin.PHP/issues/27 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:22:04

Updated: 2022-10-03T16:22:04

Reserved: 2022-10-03T00:00:00


Link: CVE-2018-18319

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-10-15T06:29:00.607

Modified: 2024-05-17T01:25:32.080


Link: CVE-2018-18319

JSON object: View

cve-icon Redhat Information

No data.

CWE