Vulnerability Description
ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another file with the same file name, which results in service disruption.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asus | Rt-Ax56U Firmware | 3.0.0.4.386.45898 |
| Asus | Rt-Ax56U | - |
Related Weaknesses (CWE)
References
- https://www.twcert.org.tw/tw/cp-132-5784-68aa3-1.htmlThird Party Advisory
- https://www.twcert.org.tw/tw/cp-132-5784-68aa3-1.htmlThird Party Advisory
FAQ
What is CVE-2022-23970?
CVE-2022-23970 is a vulnerability with a CVSS score of 8.1 (HIGH). ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a syste...
How severe is CVE-2022-23970?
CVE-2022-23970 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23970?
Check the references section above for vendor advisories and patch information. Affected products include: Asus Rt-Ax56U Firmware, Asus Rt-Ax56U.