ASUS wiress router Remote...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### 1. Vulnerability Details * Affected Vendor:RT-AC5300,RT_AC1900P,RT-AC68U,RT-AC68P,RT-AC88U,RT-AC66U,RT-AC66U_B1,RT-AC58U,RT-AC56U,RT-AC55U,RT-AC52U,RT-AC51U,RT-N18U,RT-N66U,RT-N56U,RT-AC3200,RT-AC3100,RT_AC1200GU,RT_AC1200G,RT-AC1200,RT-AC53,RT-N12HP,RT-N12HP_B1,RT-N12D1,RT-N12+,RT_N12+_PRO,RT-N16,RT-N300 and Asuswrt-Merlin(https://github.com/RMerl/asuswrt-merlin) * Affected Product: ASUS Wiress Router * Affected Version: all the latest firmware * Platform: router * Impact: Remote Command/Code Execution * Attack vector: asusdiscorvery service ### 2. Vulnerability Description When an ASUS router discovers another router device,it does not buffer the size of all discovered devices when it is added to the device list to cause a stack overflow, resulting in a remote code/command execution vulnerability.The vulnerability code is as follows: `https://github.com/RMerl/asuswrt-merlin/blob/master/release/src/router/networkmap/ASUS_Discovery.c#L184-L202` ### 3. PoC: ``` # coding=utf-8...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息