CVE-2018-8879

Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:14

Type Values Removed Values Added
References () https://pagedout.institute/download/PagedOut_001_beta1.pdf - Exploit, Third Party Advisory () https://pagedout.institute/download/PagedOut_001_beta1.pdf - Exploit, Third Party Advisory
References () https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS - Product () https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS - Product

Information

Published : 2019-11-21 16:15

Updated : 2024-11-21 04:14


NVD link : CVE-2018-8879

Mitre link : CVE-2018-8879

CVE.ORG link : CVE-2018-8879


JSON object : View

Products Affected

asus

  • rt-ac66u_firmware
  • rt-ac66u
CWE
CWE-787

Out-of-bounds Write