It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
27 Mar 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-07 08:15
Updated : 2024-03-27 07:15
NVD link : CVE-2023-39240
Mitre link : CVE-2023-39240
CVE.ORG link : CVE-2023-39240
JSON object : View
Products Affected
asus
- rt-ax56u_v2
- rt-ac86u
- rt-ax56u_v2_firmware
- rt-ax55
- rt-ac86u_firmware
- rt-ax55_firmware
CWE
CWE-134
Use of Externally-Controlled Format String