First published: Tue Sep 17 2019(Updated: )
An issue was discovered in ASUSWRT 3.0.0.4.384.20308. There is a stack-based buffer overflow issue in parse_req_queries function in wanduck.c via a long string over UDP, which may lead to an information leak.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Asuswrt-merlin | =3.0.0.4.384.20308 | |
ASUS RT-AC68U |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-20336 is high with a score of 7.5.
The affected software of CVE-2018-20336 is Asus Asuswrt-merlin 3.0.0.4.384.20308.
The vulnerability in CVE-2018-20336 can be exploited by sending a long string over UDP to trigger a stack-based buffer overflow in the parse_req_queries function in wanduck.c.
The Common Weakness Enumeration (CWE) ID of CVE-2018-20336 is CWE-119 and CWE-120.
To fix CVE-2018-20336, update the affected software to a version that includes a patch for the vulnerability.