7.2
CVE-2023-28703
- EPSS 0.31%
- Veröffentlicht 02.06.2023 11:15:10
- Zuletzt bearbeitet 21.11.2024 07:55:50
- Quelle twcert@cert.org.tw
- CVE-Watchlists
- Unerledigt
ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Asus ≫ Rt-ac86u Firmware Version3.0.0.4.386.51255
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.31% | 0.538 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| twcert@cert.org.tw | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).