Description
ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.
Published: 2022-01-14
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-27208 ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.
History

No history.

Subscriptions

Asus Rt-ax56u Rt-ax56u Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-09-17T01:01:37.824Z

Reserved: 2021-12-21T00:00:00.000Z

Link: CVE-2022-22054

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-14T05:15:11.167

Modified: 2024-11-21T06:45:59.810

Link: CVE-2022-22054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses