Количество 3
Количество 3
CVE-2022-25596
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
GHSA-39fr-rq99-f592
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
BDU:2022-04699
Уязвимость функции конфигурации микропрограммного обеспечения маршрутизаторов Wi-Fi ASUS RT-AC56U, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-25596 ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад | |
GHSA-39fr-rq99-f592 ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service. | CVSS3: 8.8 | 0% Низкий | почти 4 года назад | |
BDU:2022-04699 Уязвимость функции конфигурации микропрограммного обеспечения маршрутизаторов Wi-Fi ASUS RT-AC56U, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу