ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.html - Third Party Advisory |
Information
Published : 2022-04-07 19:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25596
Mitre link : CVE-2022-25596
CVE.ORG link : CVE-2022-25596
JSON object : View
Products Affected
asus
- rt-ac86u_firmware
- rt-ac86u
CWE
CWE-787
Out-of-bounds Write