7.2
CVE-2023-28703
- EPSS 0.41%
- Published 02.06.2023 11:15:10
- Last modified 21.11.2024 07:55:50
- Source twcert@cert.org.tw
- Teams watchlist Login
- Open Login
ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
Data is provided by the National Vulnerability Database (NVD)
Asus ≫ Rt-ac86u Firmware Version3.0.0.4.386.51255
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.41% | 0.604 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
twcert@cert.org.tw | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).