First published: Thu Apr 07 2022(Updated: )
ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ax56u Firmware | =3.0.0.4.386.45898 | |
ASUS RT-AX56U |
Update ASUS RT-AX56U firmware version to 3.0.0.4.386.45934
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-23973.
The severity of CVE-2022-23973 is high with a severity value of 8.8.
CVE-2022-23973 affects the user profile configuration function of ASUS RT-AX56U firmware version 3.0.0.4.386.45898.
The vulnerability allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations, or disrupt service.
Yes, ASUS RT-AX56U firmware version 3.0.0.4.386.45898 is vulnerable to CVE-2022-23973.
To fix CVE-2022-23973, it is recommended to update ASUS RT-AX56U firmware to a version that includes the necessary security patches.