2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2014-2719" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.374.5517, when an administrator session is active, allows remote authenticated users to obtain the administrator user name and password by reading the source code."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "20140416 ASUS RT-XXXX SOHO routers expose admin password, fixed in 3.0.0.4.374.5517" ,
"refsource" : "FULLDISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://seclists.org/fulldisclosure/2014/Apr/225"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html" ,
"refsource" : "MISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "http://support.asus.com/download.aspx?m=RT-N66U+%28VER.B1%29"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "https://support.t-mobile.com/docs/DOC-21994" ,
"refsource" : "CONFIRM" ,
2017-10-16 12:31:07 -04:00
"url" : "https://support.t-mobile.com/docs/DOC-21994"
}
]
}
}