ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-5793-4f9d3-1.html |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-17T00:46:09.147Z
Reserved: 2022-02-21T00:00:00
Link: CVE-2022-25596

No data.

Status : Modified
Published: 2022-04-07T19:15:08.807
Modified: 2024-11-21T06:52:24.530
Link: CVE-2022-25596

No data.