Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-23973

Опубликовано: 07 апр. 2022
Источник: nvd
CVSS3: 8.8
CVSS2: 5.8
EPSS Низкий

Описание

ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.45898:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*

EPSS

Процентиль: 23%
0.00077
Низкий

8.8 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-787
CWE-787

Связанные уязвимости

CVSS3: 8.8
github
почти 4 года назад

ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.

EPSS

Процентиль: 23%
0.00077
Низкий

8.8 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-787
CWE-787