Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS | product |
https://pagedout.institute/download/PagedOut_001_beta1.pdf | third party advisory exploit |