ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
2022-01-03T10:15:08.190
2024-11-21T06:30:27.930
Modified
CVSSv3.1: 8.0 (HIGH)
AV:A/AC:L/Au:S/C:C/I:C/A:C
5.1
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | asus | rt-ax56u_firmware | 3.0.0.4.386.44266 | Yes |
Hardware | asus | rt-ax56u | - | No |