First published: Wed Jan 17 2018(Updated: )
Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asuswrt-merlin Asuswrt-merlin | <=382.1_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5721 is a vulnerability found in ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) that allows web authenticated attackers to execute code via a request that updates a setting.
CVE-2018-5721 has a severity score of 8.8 (high).
CVE-2018-5721 affects ASUS routers running software from https://github.com/RMerl/asuswrt-merlin with version up to and including 382.1_2.
Unfortunately, there is no known fix for CVE-2018-5721 at the moment.
You can find more information about CVE-2018-5721 at http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/