CVE-2022-23973

Severity
8.8HIGH
EPSS
0.1%
top 72.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 7
Latest updateApr 8

Description

ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5asus/rt-ax56u3.0.0.4.386.45898
NVDasus/rt-ax56u_firmware3.0.0.4.386.45898

🔴Vulnerability Details

2
GHSA
GHSA-v6gh-mj92-4mvj: ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length2022-04-08
CVEList
ASUS RT-AX56U - Stack overflew2022-04-07