Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2023-39780 | ASUS RT-AX55 Routers OS Command Injection Vulnerability | exploitation_technique | T1133 | External Remote Services |
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
|
CVE-2023-39780 | ASUS RT-AX55 Routers OS Command Injection Vulnerability | exploitation_technique | T1078 | Valid Accounts |
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
|
CVE-2023-39780 | ASUS RT-AX55 Routers OS Command Injection Vulnerability | exploitation_technique | T1588 | Obtain Capabilities |
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
|
CVE-2023-39780 | ASUS RT-AX55 Routers OS Command Injection Vulnerability | primary_impact | T1059.004 | Unix Shell |
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
|
CVE-2023-39780 | ASUS RT-AX55 Routers OS Command Injection Vulnerability | secondary_impact | T1021.004 | SSH |
Comments
Attackers have gained access to affected ASUS routers by using brute-force login attempts and authentication bypasses, allowing them to inject and execute commands to enable SSH. Additionally, they can place a backdoor in the NVRAM.
References
|