ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-7147-afcf9-1.html |
History
Mon, 14 Oct 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 |
Mon, 14 Oct 2024 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 14 Oct 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-121 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2023-06-02T00:00:00
Updated: 2024-10-14T03:45:00.783Z
Reserved: 2023-03-21T00:00:00
Link: CVE-2023-28703
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-06-02T11:15:10.580
Modified: 2024-10-14T04:15:03.210
Link: CVE-2023-28703
Redhat
No data.