🔐 CVE Alert

CVE-2023-28703

HIGH 7.2

ASUS RT-AC86U - Buffer Overflow

CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th

ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.

CWE CWE-121
Vendor asus
Product rt-ac86u
Published Jun 2, 2023
Last Updated Jan 8, 2025
Stay Ahead of the Next One

Get instant alerts for asus rt-ac86u

Be the first to know when new high vulnerabilities affecting asus rt-ac86u are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

ASUS / RT-AC86U
3.0.0.4.386.51255

References

NVD ↗ CVE.org ↗ EPSS Data ↗
twcert.org.tw: https://www.twcert.org.tw/tw/cp-132-7147-afcf9-1.html

Credits

Tmotfl (Xingyu Xu)