Description
ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another file with the same file name, which results in service disruption.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Update ASUS RT-AX56U firmware version to 3.0.0.4.386.45934
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28886 | ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another file with the same file name, which results in service disruption. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-5784-68aa3-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-17T01:55:53.709Z
Reserved: 2022-01-26T00:00:00.000Z
Link: CVE-2022-23970
No data.
Status : Modified
Published: 2022-04-07T19:15:08.473
Modified: 2024-11-21T06:49:32.647
Link: CVE-2022-23970
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD