It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
RT-AX55: update to 3.0.0.4.386_51948 RT-AX56U_V2: update to 3.0.0.4.386_51948 RT-AC86U: update to 3.0.0.4.386_51915
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42973 | It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. |
Thu, 26 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-26T18:56:33.349Z
Reserved: 2023-07-26T00:58:24.844Z
Link: CVE-2023-39239
Updated: 2024-08-02T18:02:06.688Z
Status : Modified
Published: 2023-09-07T08:15:07.620
Modified: 2024-11-21T08:14:58.627
Link: CVE-2023-39239
No data.
OpenCVE Enrichment
No data.
EUVD