7.2
CVE-2023-28703
- EPSS 0.41%
- Veröffentlicht 02.06.2023 11:15:10
- Zuletzt bearbeitet 21.11.2024 07:55:50
- Quelle twcert@cert.org.tw
- Teams Watchlist Login
- Unerledigt Login
ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Asus ≫ Rt-ac86u Firmware Version3.0.0.4.386.51255
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.41% | 0.604 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
twcert@cert.org.tw | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).