Описание
It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одновременно
Одновременно
Одновременно
EPSS
7.2 High
CVSS3
Дефекты
Связанные уязвимости
It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. An unauthenticated remote attacker can exploit this vulnerability without privilege to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Уязвимость функции iperf файла set_iperf3_cli.cgi прикладного программного интерфейса маршрутизаторов ASUS RT-AX55, RT-AX56U и RT-AC86U, позволяющая нарушителю выполнить произвольный код
EPSS
7.2 High
CVSS3