CyRC assigned the vulnerability a CVSS 4.0 rating of 8.4 (excessive), pushed primarily by its availability impression quite than information confidentiality or integrity loss. Testing was carried out utilizing an ASUS RT-BE86U router operating firmware variations 3.0.0.6.102_37812 and earlier, although the advisory cautioned that different units utilizing the identical chipset software program could possibly be equally affected.
Chipset-level bugs linger
Researchers mentioned the vulnerability highlights why protocol-stack implementation stays open to critical flaws. “This assault is each simple to execute and extremely disruptive, underscoring that even mature and extensively deployed community applied sciences can nonetheless yield new and critical assault vectors,” mentioned Saumitra Das, vp of engineering at Qualys. “As a result of the assault may be launched by an unauthenticated shopper, encryption alone presents little safety.”
Das emphasised the function of fuzz testing in uncovering such points. “Through the years, fuzzing has uncovered a variety of vulnerabilities, together with buffer overflows in drivers, denial-of-service situations, distant code execution, and efficiency instability,” he mentioned, including that the complexity of the WiFi stack makes delicate flaws arduous to get rid of.



