First published: Thu Sep 13 2018(Updated: )
Stack-based buffer overflow on the ASUS GT-AC5300 router through 3.0.0.4.384_32738 allows remote attackers to cause a denial of service (device crash) or possibly have unspecified other impact by setting a long sh_path0 value and then sending an appGet.cgi?hook=select_list("Storage_x_SharedPath") request, because ej_select_list in router/httpd/web.c uses strcpy.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Gt-ac5300 Firmware | <=3.0.0.4.384_32738 | |
ASUS GT-AC5300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17022 is a stack-based buffer overflow vulnerability on the ASUS GT-AC5300 router.
CVE-2018-17022 allows remote attackers to cause a denial of service (device crash) or possibly have unspecified other impact.
CVE-2018-17022 has a severity rating of 7.2 (high).
To fix CVE-2018-17022, update your ASUS GT-AC5300 router firmware to version 3.0.0.4.384_32739 or later.
You can find more information about CVE-2018-17022 at this reference: https://github.com/PAGalaxyLab/VulInfo/blob/master/ASUS/buffer_overflow/ASUS%20GT-AC5300%20stack%20overflow.MD