ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-30257 | ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service. |
Fixes
Solution
Update ASUS RT-AC86U firmware version to 3.0.0.4_386_46092
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.html |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-17T00:46:09.147Z
Reserved: 2022-02-21T00:00:00
Link: CVE-2022-25596

No data.

Status : Modified
Published: 2022-04-07T19:15:08.807
Modified: 2024-11-21T06:52:24.530
Link: CVE-2022-25596

No data.

No data.