Lucene search

K
cve[email protected]CVE-2023-39240
HistorySep 07, 2023 - 8:15 a.m.

CVE-2023-39240

2023-09-0708:15:07
CWE-134
web.nvd.nist.gov
2436
cve-2023-39240
asus rt-ax56u v2
format string vulnerability
iperf client
api
remote code execution
security vulnerability

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.6%

It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.

Affected configurations

NVD
Node
asusrt-ax55_firmwareMatch3.0.0.4.386_50460
AND
asusrt-ax55Match-
Node
asusrt-ax56u_v2_firmwareMatch3.0.0.4.386_50460
AND
asusrt-ax56u_v2Match-
Node
asusrt-ac86u_firmwareMatch3.0.0.4_386_51529
AND
asusrt-ac86uMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "RT-AX55",
    "vendor": "ASUS",
    "versions": [
      {
        "status": "affected",
        "version": "3.0.0.4.386_50460"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "RT-AX56U_V2",
    "vendor": "ASUS",
    "versions": [
      {
        "status": "affected",
        "version": "3.0.0.4.386_50460"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.6%

Related for CVE-2023-39240