ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
Solution:
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.html | third party advisory |