Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/ | third party advisory exploit |