Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
References
Link | Resource |
---|---|
https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS | Product |
https://pagedout.institute/download/PagedOut_001_beta1.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-11-21 08:15
Updated : 2019-12-04 06:08
NVD link : CVE-2018-8879
Mitre link : CVE-2018-8879
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
asus
- rt-ac66u
- rt-ac66u_firmware