CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
46.9%
ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
Vendor | Product | Version | CPE |
---|---|---|---|
asus | rt-ac86u_firmware | 3.0.0.4.386.51255 | cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4.386.51255:*:*:*:*:*:*:* |
asus | rt-ac86u | - | cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:* |
[
{
"vendor": "ASUS",
"product": "RT-AC86U",
"versions": [
{
"version": "3.0.0.4.386.51255",
"status": "affected"
}
]
}
]