CVE-2023-39240Use of Externally-Controlled Format String in Rt-ax55

Severity
7.2HIGHNVD
EPSS
0.8%
top 25.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 7

Description

It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages5 packages

CVEListV5asus/rt-ax56u_v23.0.0.4.386_50460
NVDasus/rt-ax56u_v2_firmware3.0.0.4.386_50460
CVEListV5asus/rt-ax553.0.0.4.386_50460
NVDasus/rt-ax55_firmware3.0.0.4.386_50460
NVDasus/rt-ac86u_firmware3.0.0.4_386_51529

🔴Vulnerability Details

2
GHSA
GHSA-pjc4-2x49-3j92: It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API2023-09-07
CVEList
ASUS RT-AX55、RT-AX56U_V2 - Format String - 32023-09-07
CVE-2023-39240 — Asus Rt-ax55 vulnerability | cvebase