| |
Vulnerability CVE-2018-17022
Published: 2018-09-13 Modified: 2018-09-14
Description: |
Stack-based buffer overflow on the ASUS GT-AC5300 router through 3.0.0.4.384_32738 allows remote attackers to cause a denial of service (device crash) or possibly have unspecified other impact by setting a long sh_path0 value and then sending an appGet.cgi?hook=select_list("Storage_x_SharedPath") request, because ej_select_list in router/httpd/web.c uses strcpy. |
Type:
CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
8/10 |
8.5/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
Complete |
References: |
https://github.com/PAGalaxyLab/VulInfo/blob/master/ASUS/buffer_overflow/ASUS%20GT-AC5300%20stack%20overflow.MD
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|