Stack buffer overflow in httpd in Asuswrt-Merlin firmware 380.67_0RT-AC5300 and earlier for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to execute arbitrary code on the router by sending a crafted http GET request packet that includes a long delete_offline_client parameter in the url.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Asuswrt-merlin
Subscribe
|
Asuswrt-merlin
Subscribe
Rt-ac1200
Subscribe
Rt-ac3100
Subscribe
Rt-ac3200
Subscribe
Rt-ac51u
Subscribe
Rt-ac52u
Subscribe
Rt-ac53
Subscribe
Rt-ac5300
Subscribe
Rt-ac55u
Subscribe
Rt-ac56u
Subscribe
Rt-ac58u
Subscribe
Rt-ac66u
Subscribe
Rt-ac66u B1
Subscribe
Rt-ac68p
Subscribe
Rt-ac68u
Subscribe
Rt-ac88u
Subscribe
Rt-n12\+
Subscribe
Rt-n12d1
Subscribe
Rt-n12hp
Subscribe
Rt-n12hp B1
Subscribe
Rt-n16
Subscribe
Rt-n18u
Subscribe
Rt-n300
Subscribe
Rt-n56u
Subscribe
Rt-n66u
Subscribe
Rt Ac1200g
Subscribe
Rt Ac1200gu
Subscribe
Rt Ac1900p
Subscribe
Rt N12\+ Pro
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:51:06.166Z
Reserved: 2017-08-09T00:00:00
Link: CVE-2017-12754
No data.
Status : Deferred
Published: 2017-08-09T15:29:00.183
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-12754
No data.
OpenCVE Enrichment
No data.
Weaknesses