Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.
References
Link | Resource |
---|---|
http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/ | Exploit Third Party Advisory |
http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/ - Exploit, Third Party Advisory |
Information
Published : 2018-01-17 06:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5721
Mitre link : CVE-2018-5721
CVE.ORG link : CVE-2018-5721
JSON object : View
Products Affected
asuswrt-merlin
- asuswrt-merlin
CWE
CWE-787
Out-of-bounds Write