Severity
8.0HIGH
EPSS
0.2%
top 63.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 3
Latest updateJan 4

Description

ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages2 packages

CVEListV5asus/rt-ax56u3.0.0.4.386.44266
NVDasus/rt-ax56u_firmware3.0.0.4.386.44266

🔴Vulnerability Details

2
GHSA
GHSA-m8r5-j3fq-hx58: ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length2022-01-04
CVEList
ASUS RT-AX56U Router - Stack-based buffer overflow2022-01-03