CVE-2023-35720

ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected ASUS RT-AX92U routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mod_webdav.so module. When parsing a request, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-16078.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ax92u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*

History

12 Aug 2025, 16:36

Type Values Removed Values Added
CPE cpe:2.3:o:asus:rt-ax92u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*
First Time Asus
Asus rt-ax92u Firmware
Asus rt-ax92u
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1166/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1166/ - Third Party Advisory
References () https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wifi-routers-and-systems/rt-ax92u/helpdesk_bios/?model2Name=RT-AX92U - () https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/aimesh-wifi-routers-and-systems/rt-ax92u/helpdesk_bios/?model2Name=RT-AX92U - Product

03 May 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 02:15

Updated : 2025-08-12 16:36


NVD link : CVE-2023-35720

Mitre link : CVE-2023-35720


JSON object : View

Products Affected

asus

  • rt-ax92u_firmware
  • rt-ax92u
CWE

No CWE.