Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.
References
Link | Resource |
---|---|
https://pagedout.institute/download/PagedOut_001_beta1.pdf | Exploit Third Party Advisory |
https://www.asus.com/Networking/RTAC66U/HelpDesk_BIOS | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-11-21T15:26:03
Updated: 2019-11-21T15:26:03
Reserved: 2018-03-20T00:00:00
Link: CVE-2018-8879
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-11-21T16:15:11.720
Modified: 2019-12-04T14:08:07.900
Link: CVE-2018-8879
JSON object: View
Redhat Information
No data.
CWE