CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
58.0%
It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Vendor | Product | Version | CPE |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386_50460 | cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:* |
asus | rt-ax55 | - | cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:* |
asus | rt-ax56u_v2_firmware | 3.0.0.4.386_50460 | cpe:2.3:o:asus:rt-ax56u_v2_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:* |
asus | rt-ax56u_v2 | - | cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:* |
asus | rt-ac86u_firmware | 3.0.0.4_386_51529 | cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4_386_51529:*:*:*:*:*:*:* |
asus | rt-ac86u | - | cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "RT-AX55",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "3.0.0.4.386_50460"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RT-AX56U_V2",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "3.0.0.4.386_50460"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RT-AC86U",
"vendor": "ASUS",
"versions": [
{
"status": "affected",
"version": "3.0.0.4_386_51529"
}
]
}
]