Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-5721

Опубликовано: 17 янв. 2018
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:asuswrt-merlin:asuswrt-merlin:*:*:*:*:*:*:*:*
Версия до 382.1_2 (включая)

EPSS

Процентиль: 82%
0.01725
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
github
больше 3 лет назад

Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.

EPSS

Процентиль: 82%
0.01725
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-787