Stack-based buffer overflow in the ej_update_variables function in router/httpd/web.c on ASUS routers (when using software from https://github.com/RMerl/asuswrt-merlin) allows web authenticated attackers to execute code via a request that updates a setting. In ej_update_variables, the length of the variable action_script is not checked, as long as it includes a "_wan_if" substring.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T05:40:51.215Z
Reserved: 2018-01-16T00:00:00
Link: CVE-2018-5721

No data.

Status : Modified
Published: 2018-01-17T06:29:00.277
Modified: 2024-11-21T04:09:14.773
Link: CVE-2018-5721

No data.