It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
RT-AX55: update to 3.0.0.4.386_51948 RT-AX56U_V2: update to 3.0.0.4.386_51948
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42974 | It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. |
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html |
|
Thu, 26 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-26T19:19:30.745Z
Reserved: 2023-07-26T00:58:24.845Z
Link: CVE-2023-39240
Updated: 2024-08-02T18:02:06.659Z
Status : Modified
Published: 2023-09-07T08:15:07.710
Modified: 2024-11-21T08:14:58.760
Link: CVE-2023-39240
No data.
OpenCVE Enrichment
No data.
EUVD