Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v6gh-mj92-4mvj

Опубликовано: 08 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.

ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.

EPSS

Процентиль: 23%
0.00077
Низкий

8.8 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
почти 4 года назад

ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.

EPSS

Процентиль: 23%
0.00077
Низкий

8.8 High

CVSS3

Дефекты

CWE-787