Логотип exploitDog
bind:CVE-2022-23971
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-23971

Количество 2

Количество 2

nvd логотип

CVE-2022-23971

почти 4 года назад

ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-prcc-4qf3-mc5c

почти 4 года назад

ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-23971

ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.

CVSS3: 8.1
0%
Низкий
почти 4 года назад
github логотип
GHSA-prcc-4qf3-mc5c

ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.

CVSS3: 8.1
0%
Низкий
почти 4 года назад

Уязвимостей на страницу