Remote Code Execution Vulnerability in ASUS Firmware for Networking Devices
CVE-2018-8879
9.8CRITICAL
Summary
A stack-based buffer overflow exists in the ASUSwrt-Merlin firmware utilized in several ASUS networking devices. This vulnerability arises when the system processes overly long input strings directed at the blocking.asp page through GET or POST requests. Key parameters susceptible to this flaw include flag, mac, and cat_id, enabling remote attackers to potentially execute arbitrary code, thereby compromising device integrity and user security.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved