7.2
CVE-2024-3079
- EPSS 3.55%
- Veröffentlicht 14.06.2024 03:15:13
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle twcert@cert.org.tw
- CVE-Watchlists
- Unerledigt
ASUS Router - Stack-based Buffer Overflow
Certain models of ASUS routers have buffer overflow vulnerabilities, allowing remote attackers with administrative privileges to execute arbitrary commands on the device.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellerasus
≫
Produkt
rt-ax58u_firmware
Default Statusunknown
Version
0
Version <
3.0.0.4.388_24762
Status
affected
Herstellerasus
≫
Produkt
rt-ax88u_firmware
Default Statusunknown
Version
0
Version <
3.0.0.4.388_24209
Status
affected
Herstellerasus
≫
Produkt
rt-ax57_firmware
Default Statusunknown
Version
0
Version <
3.0.0.4.386_52294
Status
affected
Herstellerasus
≫
Produkt
rt-ac86u_firmware
Default Statusunknown
Version
0
Version <
3.0.0.4.386_51915
Status
affected
Herstellerasus
≫
Produkt
rt-ac68u_firmware
Default Statusunknown
Version
0
Version <
3.0.0.4.386_51668
Status
affected
Herstellerasus
≫
Produkt
zenwifi_xt8_firmware
Default Statusunknown
Version
0
Version <
3.0.0.4.388_24609
Status
affected
Herstellerasus
≫
Produkt
zenwifi_xt8_v2_firmware
Default Statusunknown
Version
0
Version <
3.0.0.4.388_24609
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 3.55% | 0.872 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| twcert@cert.org.tw | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).