{"api_version":"1","generated_at":"2026-04-23T06:18:05+00:00","cve":"CVE-2018-6000","urls":{"html":"https://cve.report/CVE-2018-6000","api":"https://cve.report/api/cve/CVE-2018-6000.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-6000","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-6000"},"summary":{"title":"CVE-2018-6000","description":"An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-01-22 20:29:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://www.exploit-db.com/exploits/44176/","name":"44176","refsource":"EXPLOIT-DB","tags":[],"title":"AsusWRT LAN - Remote Code Execution (Metasploit) - Hardware remote Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/43881/","name":"43881","refsource":"EXPLOIT-DB","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"AsusWRT Router < 3.0.0.4.380.7743 - LAN Remote Code Execution - Hardware remote Exploit","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt","name":"https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"PoC/asuswrt-lan-rce.txt at master · pedrib/PoC · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://blogs.securiteam.com/index.php/archives/3589","name":"https://blogs.securiteam.com/index.php/archives/3589","refsource":"MISC","tags":["Exploit","Technical Description","Third Party Advisory"],"title":"401 Authorization Required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb","name":"https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"","mime":"text/x-ruby","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-6000","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6000","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"6000","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"asus","cpe5":"asuswrt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"6000","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"asus","cpe5":"asuswrt","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-6000","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt","refsource":"MISC","url":"https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt"},{"name":"44176","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/44176/"},{"name":"https://blogs.securiteam.com/index.php/archives/3589","refsource":"MISC","url":"https://blogs.securiteam.com/index.php/archives/3589"},{"name":"43881","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/43881/"},{"name":"https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb","refsource":"MISC","url":"https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb"}]}},"nvd":{"publishedDate":"2018-01-22 20:29:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:asus:asuswrt:*:*:*:*:*:*:*:*","versionEndExcluding":"3.0.0.4.384_10007","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"6000","Ordinal":"122010","Title":"CVE-2018-6000","CVE":"CVE-2018-6000","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"6000","Ordinal":"1","NoteData":"An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"6000","Ordinal":"2","NoteData":"2018-01-22","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"6000","Ordinal":"3","NoteData":"2018-03-01","Type":"Other","Title":"Modified"}]}}}