Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
References
| Link | Resource |
|---|---|
| https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS | Product |
| https://pagedout.institute/download/PagedOut_001_beta1.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2019-11-21 08:15
Updated : 2019-12-04 06:08
NVD link : CVE-2018-8879
Mitre link : CVE-2018-8879
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
asus
- rt-ac66u
- rt-ac66u_firmware


