Vulnerability Description
Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asuswrt-Merlin | Asuswrt-Merlin | <= 382.1_2 |
Related Weaknesses (CWE)
References
- http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/ExploitThird Party Advisory
- http://www.w0lfzhang.com/2018/01/17/ASUS-router-stack-overflow-in-http-server/ExploitThird Party Advisory
FAQ
What is CVE-2018-5721?
CVE-2018-5721 is a vulnerability with a CVSS score of 8.8 (HIGH). Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attack...
How severe is CVE-2018-5721?
CVE-2018-5721 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-5721?
Check the references section above for vendor advisories and patch information. Affected products include: Asuswrt-Merlin Asuswrt-Merlin.