It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42974 | It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. |
Fixes
Solution
RT-AX55: update to 3.0.0.4.386_51948 RT-AX56U_V2: update to 3.0.0.4.386_51948
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html |
|
History
Thu, 26 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-26T19:19:30.745Z
Reserved: 2023-07-26T00:58:24.845Z
Link: CVE-2023-39240
Updated: 2024-08-02T18:02:06.659Z
Status : Modified
Published: 2023-09-07T08:15:07.710
Modified: 2024-11-21T08:14:58.760
Link: CVE-2023-39240
No data.
OpenCVE Enrichment
No data.
EUVD