It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
RT-AX55: update to 3.0.0.4.386_51948 RT-AX56U_V2: update to 3.0.0.4.386_51948
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42972 | It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. |
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html |
|
Thu, 26 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-26T18:58:30.829Z
Reserved: 2023-07-26T00:58:24.844Z
Link: CVE-2023-39238
Updated: 2024-08-02T18:02:06.603Z
Status : Modified
Published: 2023-09-07T08:15:07.533
Modified: 2024-11-21T08:14:58.463
Link: CVE-2023-39238
No data.
OpenCVE Enrichment
No data.
EUVD