ASUS RT-AX56U V2 & RT-AC86U - Format String -1
CVE-2023-35086
Summary
A format string vulnerability has been identified in ASUS RT-AX56U V2 and RT-AC86U routers, specifically within the logmessage_normal function of the do_detwan_cgi module in the HTTP daemon. This flaw allows a remote attacker with administrator privileges to exploit the system, potentially leading to arbitrary code execution and unauthorized system operations or service disruptions. The affected firmware versions include 3.0.0.4.386_50460 for RT-AX56U V2 and 3.0.0.4_386_51529 for RT-AC86U.
Affected Version(s)
RT-AC86U 3.0.0.4_386_51529
RT-AX56U V2 3.0.0.4.386_50460
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved