First published: Thu Apr 07 2022(Updated: )
ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ax56u Firmware | =3.0.0.4.386.45898 | |
ASUS RT-AX56U |
Update ASUS RT-AX56U firmware version to 3.0.0.4.386.45934
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ASUS RT-AX56U vulnerability is CVE-2022-23971.
The severity of CVE-2022-23971 is high, with a CVSS score of 8.1.
The path traversal vulnerability in ASUS RT-AX56U's update_PLC/PORT file allows an unauthenticated LAN attacker to overwrite a system file by uploading another PLC/PORT file with the same name.
The impacted software version is Asus Rt-ax56u Firmware 3.0.0.4.386.45898.
Yes, the ASUS RT-AX56U device is vulnerable to CVE-2022-23971.