Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-0665 : What You Need to Know

Learn about CVE-2018-0665 affecting Yamaha routers RT57i, RT58i, NVR500, and RTX810. Understand the security flaw allowing script injection and how to mitigate the risk.

Yamaha routers models RT57i, RT58i, NVR500, and RTX810 have a security flaw allowing an authorized user to insert custom scripts into the configuration data, potentially executing them on another user's browser.

Understanding CVE-2018-0665

This CVE involves script injection vulnerabilities in Yamaha routers.

What is CVE-2018-0665?

The vulnerability in Yamaha routers allows an authorized user to embed custom scripts into the configuration data, which can be executed on another user's web browser.

The Impact of CVE-2018-0665

The vulnerability poses a risk of unauthorized script execution on users' browsers, potentially leading to various security breaches.

Technical Details of CVE-2018-0665

This section provides detailed technical information about the CVE.

Vulnerability Description

The flaw enables an authorized user to inject custom scripts into the configuration data, posing a security risk.

Affected Systems and Versions

        Yamaha Broadband VoIP Router RT57i: Rev.8.00.95 and earlier
        Yamaha Broadband VoIP Router RT58i: Rev.9.01.51 and earlier
        Yamaha Broadband VoIP Router NVR500: Rev.11.00.36 and earlier
        Yamaha Gigabit VPN Router RTX810: Rev.11.01.31 and earlier
        Yamaha Firewall FWX120: Rev.11.03.25 and earlier
        Biz Box Router N58i, N500, NVR500, and RTX810 by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION
        Biz Box Router N58i and N500 by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION

Exploitation Mechanism

The vulnerability allows an authorized user to input malicious scripts into the configuration data, which can then be executed on another user's web browser.

Mitigation and Prevention

Protecting systems from CVE-2018-0665 is crucial to prevent security risks.

Immediate Steps to Take

        Update affected Yamaha routers to the latest firmware versions.
        Monitor network traffic for any suspicious activities.

Long-Term Security Practices

        Regularly review and update router configurations.
        Educate users on safe browsing practices and potential security risks.

Patching and Updates

        Apply patches and security updates provided by Yamaha to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now