8.2 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.706 High
EPSS
Percentile
98.0%
Stack-based buffer overflow in the DPC Proxy server (DpcProxy.exe) in ASUS Remote Console (aka ARC or ASMB3) 2.0.0.19 and 2.0.0.24 allows remote attackers to execute arbitrary code via a long string to TCP port 623.
CPE | Name | Operator | Version |
---|---|---|---|
asus:remote_console | asus remote console | eq | 2.0.0.19 |
asus:remote_console | asus remote console | eq | 2.0.0.24 |
aluigi.altervista.org/adv/asuxdpc-adv.txt
secunia.com/advisories/29402
securityreason.com/securityalert/3771
www.securityfocus.com/archive/1/489966/100/0/threaded
www.securityfocus.com/bid/28394
www.vupen.com/english/advisories/2008/0982/references
exchange.xforce.ibmcloud.com/vulnerabilities/41358
www.exploit-db.com/exploits/5694