ASUS RT-AX56U’s update_PLC/PORT file has a path traversal...
High severity
Unreviewed
Published
Apr 8, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Apr 7, 2022
Published to the GitHub Advisory Database
Apr 8, 2022
Last updated
Jan 27, 2023
ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.
References