First published: Mon May 13 2019(Updated: )
Format string vulnerability in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to read arbitrary sections of memory and CPU registers via the "hook" URL parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ac3200 Firmware | =3.0.0.4.382.50010 | |
ASUS RT-AC3200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-14713 is high with a score of 8.1.
CVE-2018-14713 allows attackers to read arbitrary sections of memory and CPU registers via the "hook" URL parameter in appGet.cgi on ASUS RT-AC3200 firmware version 3.0.0.4.382.50010.
No, ASUS RT-AC3200 is not vulnerable to CVE-2018-14713.
To fix CVE-2018-14713, it is recommended to update ASUS RT-AC3200 firmware to a version that is not affected by this vulnerability.
You can find more information about CVE-2018-14713 at the following link: [https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8]