ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-28889 ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.
Fixes

Solution

Update ASUS RT-AX56U firmware version to 3.0.0.4.386.45934


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-09-17T01:35:51.997Z

Reserved: 2022-01-26T00:00:00

Link: CVE-2022-23973

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-07T19:15:08.650

Modified: 2024-11-21T06:49:33.030

Link: CVE-2022-23973

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.