{ "id": "CVE-2024-28328", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T15:15:48.687", "lastModified": "2024-11-21T09:06:12.097", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CSV Injection vulnerability in the Asus RT-N12+ router allows administrator users to inject arbitrary commands or formulas in the client name parameter which can be triggered and executed in a different user session upon exporting to CSV format." }, { "lang": "es", "value": "La vulnerabilidad de inyecci\u00f3n CSV en el router Asus RT-N12+ permite a los usuarios administradores inyectar comandos o f\u00f3rmulas arbitrarias en el par\u00e1metro de nombre del cliente que pueden activarse y ejecutarse en una sesi\u00f3n de usuario diferente al exportar al formato CSV." } ], "metrics": { "cvssMetricV31": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 1.2, "impactScore": 3.7 } ] }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-77" } ] } ], "references": [ { "url": "http://asus.com", "source": "cve@mitre.org" }, { "url": "https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328", "source": "cve@mitre.org" }, { "url": "http://asus.com", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://redfoxsec.com/blog/asus-rt-n12-b1s-csv-injection-cve%E2%80%902024%E2%80%9028328/", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] }