CVE-2023-39780

high-risk
Published 2023-09-11

On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348.

Do I need to act?

!
42.7% chance of exploitation in next 30 days
EPSS score — higher than 57% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
NETWORK / LOW complexity

Affected Products (1)

Rt-Ax55 Firmware

Affected Vendors

59
/ 100
high-risk
Severity 30/34 · Critical
Exploitability 24/34 · High
Exposure 5/34 · Minimal