Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8c78-mq7w-pq49

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.

Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.

EPSS

Процентиль: 97%
0.32014
Средний

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.

EPSS

Процентиль: 97%
0.32014
Средний