3 weeks ago 48


This vulnerability has been received by the NVD and has not been analyzed.


It is identified a format drawstring vulnerability palmy ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a circumstantial value within its set_iperf3_svr.cgi module. An unauthenticated distant attacker tin exploit this vulnerability without privilege to execute distant arbitrary codification execution, arbitrary strategy cognition oregon disrupt service.


CVSS 3.x Severity and Metrics:

Nist CVSS extremist        does not lucifer  with CNA score


Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We idiosyncratic provided these links to antithetic web sites owed to the accusation that they may idiosyncratic accusation that would beryllium of engagement to you. No inferences should beryllium drawn connected narration of antithetic sites being referenced, oregon not, from this page. There whitethorn beryllium antithetic web sites that are overmuch owed for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please codification comments astir this leafage to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-134 Use of Externally-Controlled Format String Provider acceptance level TWCERT/CC  

Change History

0 alteration records recovered show changes

Read Entire Article