First published: Wed Feb 28 2024(Updated: )
A Null pointer dereference in usr/sbin/httpd in ASUS AC68U 3.0.0.4.384.82230 allows remote attackers to trigger DoS via network packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-AC68U | ||
All of | ||
ASUS 4G-AC68U Firmware | =3.0.0.4.384.82230 | |
ASUS 4G-AC68U Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26342 is classified as a high severity vulnerability due to its potential to allow remote denial of service attacks.
To mitigate CVE-2024-26342, it is recommended to update the firmware of the ASUS AC68U router to the latest version provided by the manufacturer.
CVE-2024-26342 allows remote attackers to trigger a denial of service (DoS) condition via specially crafted network packets.
CVE-2024-26342 specifically affects the ASUS RT-AC68U router running firmware version 3.0.0.4.384.82230.
Yes, CVE-2024-26342 can be exploited remotely, allowing attackers to initiate a denial of service attack without physical access to the device.