ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
asus rt-ax56u_firmware 3.0.0.4.386.45898 |