CVE-2023-28703
ASUS RT-AC86U - Buffer Overflow
CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th
ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
| CWE | CWE-121 |
| Vendor | asus |
| Product | rt-ac86u |
| Published | Jun 2, 2023 |
| Last Updated | Jan 8, 2025 |
Stay Ahead of the Next One
Get instant alerts for asus rt-ac86u
Be the first to know when new high vulnerabilities affecting asus rt-ac86u are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
ASUS / RT-AC86U
3.0.0.4.386.51255
References
Credits
Tmotfl (Xingyu Xu)