Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-39fr-rq99-f592

Опубликовано: 08 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.

ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.

EPSS

Процентиль: 23%
0.00077
Низкий

8.8 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
почти 4 года назад

ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.

CVSS3: 8.8
fstec
больше 3 лет назад

Уязвимость функции конфигурации микропрограммного обеспечения маршрутизаторов Wi-Fi ASUS RT-AC56U, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 23%
0.00077
Низкий

8.8 High

CVSS3

Дефекты

CWE-787