First published: Thu Sep 07 2023(Updated: )
It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
Credit: twcert@cert.org.tw twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ax55 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX55 | ||
Asus Rt-ax56u V2 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX56U V2 | ||
Asus Rt-ac86u Firmware | =3.0.0.4_386_51529 | |
ASUS RT-AC86U | ||
All of | ||
Asus Rt-ax55 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX55 | ||
All of | ||
Asus Rt-ax56u V2 Firmware | =3.0.0.4.386_50460 | |
ASUS RT-AX56U V2 | ||
All of | ||
Asus Rt-ac86u Firmware | =3.0.0.4_386_51529 | |
ASUS RT-AC86U |
RT-AX55: update to 3.0.0.4.386_51948 RT-AX56U_V2: update to 3.0.0.4.386_51948 RT-AC86U: update to 3.0.0.4.386_51915
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39239 is a format string vulnerability in ASUS RT-AX56U V2’s General function API.
CVE-2023-39239 affects ASUS RT-AX56U V2 by lacking validation for a specific value within its apply.cgi module.
An unauthenticated remote attacker can exploit CVE-2023-39239 without privilege.
The severity of CVE-2023-39239 is critical (9.8).
No information about a fix is available at this time.