First published: Thu Nov 21 2019(Updated: )
Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ac66u Firmware | <3.0.0.4.382.50470 | |
ASUS RT-AC66U |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8879 is a stack-based buffer overflow vulnerability found in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470.
CVE-2018-8879 has a severity rating of 9.8 (critical).
A remote attacker can exploit CVE-2018-8879 by providing a long string to the blocking.asp page via a GET or POST request, allowing them to execute arbitrary code.
ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 are affected by CVE-2018-8879.
To fix CVE-2018-8879, it is recommended to update the firmware of the affected ASUS devices to version 384.4 or newer, or 3.0.0.4.382.50470 or newer for ASUS firmware.