CVE-2023-39239

Severity
7.2HIGH
EPSS
0.8%
top 25.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 7

Description

It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages6 packages

CVEListV5asus/rt-ax56u_v23.0.0.4.386_50460
NVDasus/rt-ax56u_v2_firmware3.0.0.4.386_50460
CVEListV5asus/rt-ax553.0.0.4.386_50460
CVEListV5asus/rt-ac86u3.0.0.4_386_51529
NVDasus/rt-ax55_firmware3.0.0.4.386_50460

🔴Vulnerability Details

2
GHSA
GHSA-3vqq-6vgg-h45h: It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API2023-09-07
CVEList
ASUS RT-AX55、RT-AX56U_V2、RT-AC86U - Format String - 22023-09-07