CVE-2023-35086

Severity
7.2HIGH
EPSS
75.1%
top 1.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 21

Description

It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages4 packages

CVEListV5asus/rt-ac86u3.0.0.4_386_51529
CVEListV5asus/rt-ax56u_v23.0.0.4.386_50460
NVDasus/rt-ac86u_firmware3.0.0.4_386_51529
NVDasus/rt-ax56u_v2_firmware3.0.0.4.386_50460

🔴Vulnerability Details

2
GHSA
GHSA-r4fx-9v33-wcf4: It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U2023-07-21
CVEList
ASUS RT-AX56U V2 & RT-AC86U - Format String -12023-07-21