Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU77536
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-28702
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsTUF-AX5400: before 3.0.0.4.388.23285
TUF-AX6000: before 3.0.0.4.388.31927
RT-AX58U: before 3.0.0.4.388.23403
RT-AX82U: before 3.0.0.4.388.23285
RT-AX86S: before 3.0.0.4.388.23285
RT-AX86U: before 3.0.0.4.388.23285
RT-AX86U PRO: before 3.0.0.4.388.23285
ZenWiFi XT8_V2: before 3.0.0.4.388.23285
ZenWiFi XT8: before 3.0.0.4.388.23285
ZenWiFi XT9: before 3.0.0.4.388.23285
GS-AX3000: before 1.4.8.3
GS-AX5400: before 3.0.0.4.388.23012
GT-AX11000: before 3.0.0.4.388.23285
GT-AX6000: before 3.0.0.4.388.23285
GT-AXE11000: before 3.0.0.4.388.23482
GT-AXE11000 PRO: before 3.0.0.4.388.23285
GT-AXE16000: before 3.0.0.4.388.23012
GT6: before 3.0.0.4.388.23145
RT-AX3000: before 3.0.0.4.388.23403
External linkshttp://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70145
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-46871
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in libusrsctp. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsTUF-AX5400: before 3.0.0.4.388.23285
TUF-AX6000: before 3.0.0.4.388.31927
RT-AX58U: before 3.0.0.4.388.23403
RT-AX82U: before 3.0.0.4.388.23285
RT-AX86S: before 3.0.0.4.388.23285
RT-AX86U: before 3.0.0.4.388.23285
RT-AX86U PRO: before 3.0.0.4.388.23285
ZenWiFi XT8_V2: before 3.0.0.4.388.23285
ZenWiFi XT8: before 3.0.0.4.388.23285
ZenWiFi XT9: before 3.0.0.4.388.23285
GS-AX3000: before 1.4.8.3
GS-AX5400: before 3.0.0.4.388.23012
GT-AX11000: before 3.0.0.4.388.23285
GT-AX6000: before 3.0.0.4.388.23285
GT-AXE11000: before 3.0.0.4.388.23482
GT-AXE11000 PRO: before 3.0.0.4.388.23285
GT-AXE16000: before 3.0.0.4.388.23012
GT6: before 3.0.0.4.388.23145
RT-AX3000: before 3.0.0.4.388.23403
External linkshttp://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU16646
Risk: High
CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2018-1160
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in dsi_opensess.c. A remote attacker can trigger an out-of-bounds write and crash the affected application or execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsTUF-AX5400: before 3.0.0.4.388.23285
TUF-AX6000: before 3.0.0.4.388.31927
RT-AX58U: before 3.0.0.4.388.23403
RT-AX82U: before 3.0.0.4.388.23285
RT-AX86S: before 3.0.0.4.388.23285
RT-AX86U: before 3.0.0.4.388.23285
RT-AX86U PRO: before 3.0.0.4.388.23285
ZenWiFi XT8_V2: before 3.0.0.4.388.23285
ZenWiFi XT8: before 3.0.0.4.388.23285
ZenWiFi XT9: before 3.0.0.4.388.23285
GS-AX3000: before 1.4.8.3
GS-AX5400: before 3.0.0.4.388.23012
GT-AX11000: before 3.0.0.4.388.23285
GT-AX6000: before 3.0.0.4.388.23285
GT-AXE11000: before 3.0.0.4.388.23482
GT-AXE11000 PRO: before 3.0.0.4.388.23285
GT-AXE16000: before 3.0.0.4.388.23012
GT6: before 3.0.0.4.388.23145
RT-AX3000: before 3.0.0.4.388.23403
External linkshttp://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU65842
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-26376
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in the httpd unescape functionality. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsTUF-AX5400: before 3.0.0.4.388.23285
TUF-AX6000: before 3.0.0.4.388.31927
RT-AX58U: before 3.0.0.4.388.23403
RT-AX82U: before 3.0.0.4.388.23285
RT-AX86S: before 3.0.0.4.388.23285
RT-AX86U: before 3.0.0.4.388.23285
RT-AX86U PRO: before 3.0.0.4.388.23285
ZenWiFi XT8_V2: before 3.0.0.4.388.23285
ZenWiFi XT8: before 3.0.0.4.388.23285
ZenWiFi XT9: before 3.0.0.4.388.23285
GS-AX3000: before 1.4.8.3
GS-AX5400: before 3.0.0.4.388.23012
GT-AX11000: before 3.0.0.4.388.23285
GT-AX6000: before 3.0.0.4.388.23285
GT-AXE11000: before 3.0.0.4.388.23482
GT-AXE11000 PRO: before 3.0.0.4.388.23285
GT-AXE16000: before 3.0.0.4.388.23012
GT6: before 3.0.0.4.388.23145
RT-AX3000: before 3.0.0.4.388.23403
External linkshttp://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77537
Risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-28703
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the cgi function. A remote administrator can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsTUF-AX5400: before 3.0.0.4.388.23285
TUF-AX6000: before 3.0.0.4.388.31927
RT-AX58U: before 3.0.0.4.388.23403
RT-AX82U: before 3.0.0.4.388.23285
RT-AX86S: before 3.0.0.4.388.23285
RT-AX86U: before 3.0.0.4.388.23285
RT-AX86U PRO: before 3.0.0.4.388.23285
ZenWiFi XT8_V2: before 3.0.0.4.388.23285
ZenWiFi XT8: before 3.0.0.4.388.23285
ZenWiFi XT9: before 3.0.0.4.388.23285
GS-AX3000: before 1.4.8.3
GS-AX5400: before 3.0.0.4.388.23012
GT-AX11000: before 3.0.0.4.388.23285
GT-AX6000: before 3.0.0.4.388.23285
GT-AXE11000: before 3.0.0.4.388.23482
GT-AXE11000 PRO: before 3.0.0.4.388.23285
GT-AXE16000: before 3.0.0.4.388.23012
GT6: before 3.0.0.4.388.23145
RT-AX3000: before 3.0.0.4.388.23403
External linkshttp://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.