Vulnerability Description
ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected ASUS RT-AX92U routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mod_webdav.so module. When parsing a request, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-16078.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asus | Rt-Ax92U Firmware | 3.0.0.4.386.46061 |
| Asus | Rt-Ax92U | - |
Related Weaknesses (CWE)
References
- https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wProduct
- https://www.zerodayinitiative.com/advisories/ZDI-23-1166/Third Party Advisory
- https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wProduct
- https://www.zerodayinitiative.com/advisories/ZDI-23-1166/Third Party Advisory
FAQ
What is CVE-2023-35720?
CVE-2023-35720 is a vulnerability with a CVSS score of 6.5 (MEDIUM). ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected ASUS RT-AX92...
How severe is CVE-2023-35720?
CVE-2023-35720 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-35720?
Check the references section above for vendor advisories and patch information. Affected products include: Asus Rt-Ax92U Firmware, Asus Rt-Ax92U.