Описание
ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.44266:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*
EPSS
Процентиль: 36%
0.00155
Низкий
8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-121
CWE-1284
Связанные уязвимости
CVSS3: 8
github
около 4 лет назад
ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
EPSS
Процентиль: 36%
0.00155
Низкий
8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-121
CWE-1284