ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28889 | ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service. |
Fixes
Solution
Update ASUS RT-AX56U firmware version to 3.0.0.4.386.45934
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-5787-b0e64-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-17T01:35:51.997Z
Reserved: 2022-01-26T00:00:00.000Z
Link: CVE-2022-23973
No data.
Status : Modified
Published: 2022-04-07T19:15:08.650
Modified: 2024-11-21T06:49:33.030
Link: CVE-2022-23973
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD