Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-prcc-4qf3-mc5c

Опубликовано: 08 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.

ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.

EPSS

Процентиль: 22%
0.00074
Низкий

8.1 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 8.1
nvd
почти 4 года назад

ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.

EPSS

Процентиль: 22%
0.00074
Низкий

8.1 High

CVSS3

Дефекты

CWE-22