ASUS RT-AC86U - Command injection vulnerability - 1
CVE-2023-38031

8.8HIGH

Key Information:

Vendor
Asus
Status
Vendor
CVE Published:
7 September 2023

Summary

The ASUS RT-AC86U router's Adaptive QoS Web History function is vulnerable due to insufficient filtering of special characters. This oversight allows a remote attacker with standard user privileges to exploit the vulnerability. Through command injection tactics, the attacker can execute arbitrary commands, which may lead to disruption of system functionality or termination of critical services, posing a significant threat to network integrity.

Affected Version(s)

RT-AC86U 3.0.0.4.386.51529

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.