First published: Fri Jul 21 2023(Updated: )
It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.
Credit: twcert@cert.org.tw twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ac86u Firmware | =3.0.0.4_386_51529 | |
ASUS RT-AC86U | ||
Asus Rt-ax56u V2 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX56U V2 | ||
All of | ||
Asus Rt-ac86u Firmware | =3.0.0.4_386_51529 | |
ASUS RT-AC86U | ||
All of | ||
Asus Rt-ax56u V2 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX56U V2 |
RT-AX56U V2: update firmware version to 3.0.0.4_386_51598 RT-AC86U: update firmware version 3.0.0.4.386_51915
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U is CVE-2023-35086.
The severity of CVE-2023-35086 is critical with a severity value of 9.
The firmware versions 3.0.0.4_386_51529 for ASUS RT-AC86U and 3.0.0.4.386_50460 for ASUS RT-AX56U V2 are affected by CVE-2023-35086.
CVE-2023-35086 vulnerability occurs due to the direct use of user input as a format string in the logmessage_normal function of the do_detwan_cgi module.
An unauthenticated remote attacker without privilege can exploit CVE-2023-35086 by exploiting the format string vulnerability to execute arbitrary code.