CVE-2023-35720

ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected ASUS RT-AX92U routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mod_webdav.so module. When parsing a request, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-16078.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ax92u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*

History

12 Aug 2025, 16:36

Type Values Removed Values Added
First Time Asus
Asus rt-ax92u Firmware
Asus rt-ax92u
CPE cpe:2.3:o:asus:rt-ax92u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*
References () https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wifi-routers-and-systems/rt-ax92u/helpdesk_bios/?model2Name=RT-AX92U - () https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wifi-routers-and-systems/rt-ax92u/helpdesk_bios/?model2Name=RT-AX92U - Product
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1166/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1166/ - Third Party Advisory

21 Nov 2024, 08:08

Type Values Removed Values Added
Summary
  • (es) ASUS RT-AX92U lighttpd mod_webdav.so Vulnerabilidad de divulgación de información de inyección SQL. Esta vulnerabilidad permite a atacantes adyacentes a la red revelar información confidencial en los enrutadores ASUS RT-AX92U afectados. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del módulo mod_webdav.so. Al analizar una solicitud, el proceso no valida adecuadamente una cadena proporcionada por el usuario antes de usarla para construir consultas SQL. Un atacante puede aprovechar esta vulnerabilidad para revelar información en el contexto de la raíz. Era ZDI-CAN-16078.
References () https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wifi-routers-and-systems/rt-ax92u/helpdesk_bios/?model2Name=RT-AX92U - () https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wifi-routers-and-systems/rt-ax92u/helpdesk_bios/?model2Name=RT-AX92U -
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1166/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1166/ -

03 May 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 02:15

Updated : 2025-08-12 16:36


NVD link : CVE-2023-35720

Mitre link : CVE-2023-35720

CVE.ORG link : CVE-2023-35720


JSON object : View

Products Affected

asus

  • rt-ax92u
  • rt-ax92u_firmware
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')