Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.
References
Link | Resource |
---|---|
http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-01-16 22:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-5721
Mitre link : CVE-2018-5721
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
asuswrt-merlin
- asuswrt-merlin