Received
This vulnerability has been received by the NVD and has not been analyzed.
Description
It is identified a format drawstring vulnerability palmy ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a circumstantial value within its set_iperf3_svr.cgi module. An unauthenticated distant attacker tin exploit this vulnerability without privilege to execute distant arbitrary codification execution, arbitrary strategy cognition oregon disrupt service.
Severity
CVSS 3.x Severity and Metrics:
CNA: TWCERT/CC
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References to Advisories, Solutions, and Tools
By selecting these links, you volition beryllium leaving NIST webspace. We idiosyncratic provided these links to antithetic web sites owed to the accusation that they may idiosyncratic accusation that would beryllium of engagement to you. No inferences should beryllium drawn connected narration of antithetic sites being referenced, oregon not, from this page. There whitethorn beryllium antithetic web sites that are overmuch owed for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please codification comments astir this leafage to [email protected].
Weakness Enumeration
CWE-134 | Use of Externally-Controlled Format String |
|
Change History
0 alteration records recovered show changes