HIGH · 8.8

CVE-2022-25596

ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker t...

Vulnerability Description

ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
AsusRt-Ac86U Firmware3.0.0.4.386.45956
AsusRt-Ac86U-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-25596?

CVE-2022-25596 is a vulnerability with a CVSS score of 8.8 (HIGH). ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker t...

How severe is CVE-2022-25596?

CVE-2022-25596 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-25596?

Check the references section above for vendor advisories and patch information. Affected products include: Asus Rt-Ac86U Firmware, Asus Rt-Ac86U.