Vulnerability Description
ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asus | Rt-Ax56U Firmware | 3.0.0.4.386.45898 |
| Asus | Rt-Ax56U | - |
Related Weaknesses (CWE)
References
- https://www.twcert.org.tw/tw/cp-132-5787-b0e64-1.htmlThird Party Advisory
- https://www.twcert.org.tw/tw/cp-132-5787-b0e64-1.htmlThird Party Advisory
FAQ
What is CVE-2022-23973?
CVE-2022-23973 is a vulnerability with a CVSS score of 8.8 (HIGH). ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitr...
How severe is CVE-2022-23973?
CVE-2022-23973 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23973?
Check the references section above for vendor advisories and patch information. Affected products include: Asus Rt-Ax56U Firmware, Asus Rt-Ax56U.