Remote Code Execution Vulnerability in ASUS Firmware for Networking Devices
CVE-2018-8879

9.8CRITICAL

Key Information:

Vendor
Asus
Vendor
CVE Published:
21 November 2019

Summary

A stack-based buffer overflow exists in the ASUSwrt-Merlin firmware utilized in several ASUS networking devices. This vulnerability arises when the system processes overly long input strings directed at the blocking.asp page through GET or POST requests. Key parameters susceptible to this flaw include flag, mac, and cat_id, enabling remote attackers to potentially execute arbitrary code, thereby compromising device integrity and user security.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.