Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
References
Link | Resource |
---|---|
https://pagedout.institute/download/PagedOut_001_beta1.pdf | Exploit Third Party Advisory |
https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS | Product |
https://pagedout.institute/download/PagedOut_001_beta1.pdf | Exploit Third Party Advisory |
https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://pagedout.institute/download/PagedOut_001_beta1.pdf - Exploit, Third Party Advisory | |
References | () https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS - Product |
Information
Published : 2019-11-21 16:15
Updated : 2024-11-21 04:14
NVD link : CVE-2018-8879
Mitre link : CVE-2018-8879
CVE.ORG link : CVE-2018-8879
JSON object : View
Products Affected
asus
- rt-ac66u_firmware
- rt-ac66u
CWE
CWE-787
Out-of-bounds Write