First published: Thu Sep 07 2023(Updated: )
It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Credit: twcert@cert.org.tw twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ax55 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX55 | ||
Asus Rt-ax56u V2 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX56U V2 | ||
Asus Rt-ac86u Firmware | =3.0.0.4_386_51529 | |
ASUS RT-AC86U | ||
All of | ||
Asus Rt-ax55 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX55 | ||
All of | ||
Asus Rt-ax56u V2 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX56U V2 | ||
All of | ||
Asus Rt-ac86u Firmware | =3.0.0.4_386_51529 | |
ASUS RT-AC86U |
RT-AX55: update to 3.0.0.4.386_51948 RT-AX56U_V2: update to 3.0.0.4.386_51948
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ASUS RT-AX56U V2 vulnerability is CVE-2023-39238.
The severity of CVE-2023-39238 is critical (CVSS score of 9.8).
The format string vulnerability in ASUS RT-AX56U V2 occurs due to lacking validation for a specific value within its set_iperf3_svr.cgi module.
CVE-2023-39238 can be exploited by an unauthenticated remote attacker without privilege.
The fix for this vulnerability may be provided by ASUS in a firmware update.