Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-564g-xwvc-g44q

Опубликовано: 15 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.

ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.

EPSS

Процентиль: 29%
0.00103
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 6.5
nvd
около 4 лет назад

ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.

EPSS

Процентиль: 29%
0.00103
Низкий

Дефекты

CWE-22