This indicates an attempt to exploit a buffer overflow vulnerability in Asus Remote Console DPC Proxy.
The vulnerability is caused by an error that occurs when the vulnerable software receives requests on TCP port 623, which are longer than anticipated. It allows a remote attacker to execute arbitrary code by sending specially crafted packets.
Asus Remote Console 220.127.116.11 and later versions.
System Compromise: Remote attackers can gain control of vulnerable systems.
Currently we are not aware of any vendor supplied patch for this issue. We recommend the use of a firewall tool to block ingress traffic on TCP port 623.