Описание
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одновременно
EPSS
8.8 High
CVSS3
5.8 Medium
CVSS2
Дефекты
Связанные уязвимости
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
Уязвимость функции конфигурации микропрограммного обеспечения маршрутизаторов Wi-Fi ASUS RT-AC56U, позволяющая нарушителю выполнить произвольный код
EPSS
8.8 High
CVSS3
5.8 Medium
CVSS2