Lucene search

K
cvelistTwcertCVELIST:CVE-2023-35086
HistoryJul 21, 2023 - 6:32 a.m.

CVE-2023-35086 ASUS RT-AX56U V2 & RT-AC86U - Format String -1

2023-07-2106:32:20
CWE-134
twcert
www.cve.org
format string vulnerability
asus
rt-ax56u v2
rt-ac86u
remote code execution
administrator privilege
arbitrary system operation
disrupt service
cve-2023-35086

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

57.2%

It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.

This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "RT-AX56U V2",
    "vendor": "ASUS",
    "versions": [
      {
        "status": "affected",
        "version": "3.0.0.4.386_50460"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "RT-AC86U",
    "vendor": "ASUS",
    "versions": [
      {
        "status": "affected",
        "version": "3.0.0.4_386_51529"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

57.2%

Related for CVELIST:CVE-2023-35086