CVE-2022-25596

Published Apr 7, 2022

Last updated 3 years ago

Overview

Description
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
Source
twcert@cert.org.tw
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
5.8
Impact score
6.4
Exploitability score
6.5
Vector string
AV:A/AC:L/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-787
twcert@cert.org.tw
CWE-787

Social media

Hype score
Not currently trending

Configurations