Stack-Based Buffer Overflow in ASUS GT-AC5300 Router
CVE-2018-17022
7.2HIGH
Summary
The ASUS GT-AC5300 router is susceptible to a stack-based buffer overflow due to an inadequate handling of input in its web interface. Specifically, a long input value for 'sh_path0' in requests to appGet.cgi can lead to device crashes or potentially allow attackers to exploit the device in unspecified ways. This vulnerability arises from the use of the 'strcpy' function in the router's web server code, which does not properly validate input sizes, allowing remote attackers to manipulate the device's operation.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability Reserved
Vulnerability published