Vulnerability Description
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asus | Rt-Ac86U Firmware | 3.0.0.4.386.45956 |
| Asus | Rt-Ac86U | - |
Related Weaknesses (CWE)
References
- https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.htmlThird Party Advisory
- https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.htmlThird Party Advisory
FAQ
What is CVE-2022-25596?
CVE-2022-25596 is a vulnerability with a CVSS score of 8.8 (HIGH). ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker t...
How severe is CVE-2022-25596?
CVE-2022-25596 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25596?
Check the references section above for vendor advisories and patch information. Affected products include: Asus Rt-Ac86U Firmware, Asus Rt-Ac86U.