Vulnerabilites related to asus - rt-ax55
cve-2021-41435
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:27.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://asus.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-19T11:26:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://asus.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://asus.com", "refsource": "MISC", "url": "http://asus.com" }, { "name": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "name": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios", "refsource": "MISC", "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41435", "datePublished": "2021-11-19T11:26:30", "dateReserved": "2021-09-20T00:00:00", "dateUpdated": "2024-08-04T03:15:27.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11985
Vulnerability from cvelistv5
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ASUS | RT-AX55 |
Version: before 3.0.0.4.386_52332 < |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11985", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:05:35.472193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:09:12.075Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "before 3.0.0.4.386_52332", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX55 V2", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "before 3.0.0.4.386_52332", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX56U", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "before 3.0.0.4.386_51712", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX56U_V2", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "before 3.0.0.4.386_52332", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX57", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "before 3.0.0.4.386_52332", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX58U", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "before 3.0.0.4_388_25127", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX58U V2", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "before 3.0.0.4_388_25127", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper input validation vulnerability leads to device crashes in certain ASUS router models. \u003cbr\u003eRefer to the \u002712/03/2024 ASUS Router Improper Input Validation\u0027 section on the ASUS Security Advisory for more information.\n\n\u003cp\u003e\n\n\u003c/p\u003e\n\n\u003cp\u003e\u003cbr\u003e\u003c/p\u003e" } ], "value": "An improper input validation vulnerability leads to device crashes in certain ASUS router models. \nRefer to the \u002712/03/2024 ASUS Router Improper Input Validation\u0027 section on the ASUS Security Advisory for more information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T01:20:10.965Z", "orgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1", "shortName": "ASUS" }, "references": [ { "url": "https://www.asus.com/content/asus-product-security-advisory/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1", "assignerShortName": "ASUS", "cveId": "CVE-2024-11985", "datePublished": "2024-12-04T01:20:10.965Z", "dateReserved": "2024-11-29T07:16:49.435Z", "dateUpdated": "2024-12-04T14:09:12.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39240
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | ASUS | RT-AX55 |
Version: 3.0.0.4.386_50460 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax56u_v2", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386.50460" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax55", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39240", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T19:18:03.026290Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T19:19:30.745Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX56U_V2", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] } ], "datePublic": "2023-09-15T01:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" } ], "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" } ], "impacts": [ { "capecId": "CAPEC-135", "descriptions": [ { "lang": "en", "value": "CAPEC-135 Format String Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T07:02:04.782Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\u003cp\u003eRT-AX55: update to 3.0.0.4.386_51948 \u003c/p\u003e\u003cp\u003eRT-AX56U_V2: update to 3.0.0.4.386_51948 \u003cbr\u003e\u003c/p\u003e" } ], "value": "\nRT-AX55: update to 3.0.0.4.386_51948 \n\nRT-AX56U_V2: update to 3.0.0.4.386_51948 \n\n" } ], "source": { "advisory": "TVN-202309009", "discovery": "EXTERNAL" }, "title": "ASUS RT-AX55\u3001RT-AX56U_V2 - Format String - 3", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2023-39240", "datePublished": "2023-09-07T07:25:32.504Z", "dateReserved": "2023-07-26T00:58:24.845Z", "dateUpdated": "2024-09-26T19:19:30.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39239
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://www.twcert.org.tw/tw/cp-132-7355-0ce8d-1.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "rt-ax56u_v2", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax55", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac86u", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4_386_51529" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39239", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T18:53:39.966621Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T18:56:33.349Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX56U_V2", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] }, { "defaultStatus": "unaffected", "product": "RT-AC86U", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4_386_51529" } ] } ], "datePublic": "2023-09-15T01:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n\u003cbr\u003e\n\n" } ], "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" } ], "impacts": [ { "capecId": "CAPEC-135", "descriptions": [ { "lang": "en", "value": "CAPEC-135 Format String Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T07:14:38.193Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://https://www.twcert.org.tw/tw/cp-132-7355-0ce8d-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eRT-AX55: update to 3.0.0.4.386_51948\u0026nbsp;\u003c/p\u003e\u003cp\u003eRT-AX56U_V2: update to 3.0.0.4.386_51948\u0026nbsp;\u003c/p\u003e\u003cp\u003eRT-AC86U: update to 3.0.0.4.386_51915\u003c/p\u003e" } ], "value": "\nRT-AX55: update to 3.0.0.4.386_51948\u00a0\n\nRT-AX56U_V2: update to 3.0.0.4.386_51948\u00a0\n\nRT-AC86U: update to 3.0.0.4.386_51915\n\n" } ], "source": { "advisory": "TVN-202309008", "discovery": "EXTERNAL" }, "title": "ASUS RT-AX55\u3001RT-AX56U_V2\u3001RT-AC86U - Format String - 2", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2023-39239", "datePublished": "2023-09-07T07:18:39.017Z", "dateReserved": "2023-07-26T00:58:24.844Z", "dateUpdated": "2024-09-26T18:56:33.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39238
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | ASUS | RT-AX55 |
Version: 3.0.0.4.386_50460 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "rt-ax56u_v2", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "rt-ax55", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39238", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T18:57:07.141155Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T18:58:30.829Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX56U_V2", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386_50460" } ] } ], "datePublic": "2023-09-15T01:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nIt is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value\u0026nbsp;within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" } ], "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value\u00a0within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" } ], "impacts": [ { "capecId": "CAPEC-135", "descriptions": [ { "lang": "en", "value": "CAPEC-135 Format String Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T07:06:35.024Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eRT-AX55: update to 3.0.0.4.386_51948\u0026nbsp;\u003c/p\u003e\u003cp\u003eRT-AX56U_V2: update to 3.0.0.4.386_51948\u0026nbsp;\u003cbr\u003e\u003c/p\u003e" } ], "value": "\nRT-AX55: update to 3.0.0.4.386_51948\u00a0\n\nRT-AX56U_V2: update to 3.0.0.4.386_51948\u00a0\n\n" } ], "source": { "advisory": "TVN-202309007", "discovery": "EXTERNAL" }, "title": "ASUS RT-AX55\u3001RT-AX56U_V2 - Format String - 1", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2023-39238", "datePublished": "2023-09-07T07:10:47.153Z", "dateReserved": "2023-07-26T00:58:24.844Z", "dateUpdated": "2024-09-26T18:58:30.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37910
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html | x_refsource_MISC |
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ASUS | GT-AXE11000 |
Version: unspecified < 3.0.0.4.386.45898 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:09.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GT-AXE11000", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386.45898", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RT-AX3000", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386.45898", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386.45898", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "RT-AX58U", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386.45898", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TUF-AX3000", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386.45898", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-12T00:00:00", "descriptions": [ { "lang": "en", "value": "ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users\u0027 connections by sending specially crafted SAE authentication frames." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-799", "description": "CWE-799 Improper Control of Interaction Frequency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T01:40:13", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html" } ], "solutions": [ { "lang": "en", "value": "Update Routes firmware to last version:\nASUS GT-AXE11000 v3.0.0.4.386.45898\nASUS RT-AX3000 v3.0.0.4.386.45898\nASUS RT-AX55 v3.0.0.4.386.45898\nASUS RT-AX58U v3.0.0.4.386.45898\nASUS TUF-AX3000 v3.0.0.4.386.45898" } ], "source": { "advisory": "TVN-202109034", "discovery": "EXTERNAL" }, "title": "ASUS GT-AXE11000, RT-AX3000, RT-AX55, RT-AX58U, TUF-AX3000 - Improper Authentication", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "TWCERT/CC", "ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2021-11-12T07:06:00.000Z", "ID": "CVE-2021-37910", "STATE": "PUBLIC", "TITLE": "ASUS GT-AXE11000, RT-AX3000, RT-AX55, RT-AX58U, TUF-AX3000 - Improper Authentication" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GT-AXE11000", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.0.4.386.45898" } ] } }, { "product_name": "RT-AX3000", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.0.4.386.45898" } ] } }, { "product_name": "RT-AX55", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.0.4.386.45898" } ] } }, { "product_name": "RT-AX58U", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.0.4.386.45898" } ] } }, { "product_name": "TUF-AX3000", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.0.0.4.386.45898" } ] } } ] }, "vendor_name": "ASUS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users\u0027 connections by sending specially crafted SAE authentication frames." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-799 Improper Control of Interaction Frequency" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html", "refsource": "MISC", "url": "https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html" } ] }, "solution": [ { "lang": "en", "value": "Update Routes firmware to last version:\nASUS GT-AXE11000 v3.0.0.4.386.45898\nASUS RT-AX3000 v3.0.0.4.386.45898\nASUS RT-AX55 v3.0.0.4.386.45898\nASUS RT-AX58U v3.0.0.4.386.45898\nASUS TUF-AX3000 v3.0.0.4.386.45898" } ], "source": { "advisory": "TVN-202109034", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2021-37910", "datePublished": "2021-11-12T01:40:13.569980Z", "dateReserved": "2021-08-02T00:00:00", "dateUpdated": "2024-09-16T19:05:28.405Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41346
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:01:34.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "rt-ax55_firmware", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41346", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T15:51:29.591472Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T18:35:57.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "datePublic": "2023-11-03T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." } ], "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-03T07:15:22.787Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nUpdate version to 3.0.0.4.386_51948 .\n\n\u003cbr\u003e" } ], "value": "\nUpdate version to 3.0.0.4.386_51948 .\n\n\n" } ], "source": { "advisory": "TVN-202311003", "discovery": "EXTERNAL" }, "title": "ASUS RT-AX55 - command injection - 2", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2023-41346", "datePublished": "2023-11-03T04:21:26.406Z", "dateReserved": "2023-08-29T00:11:47.812Z", "dateUpdated": "2024-09-06T18:35:57.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43702
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:03:08.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-05T11:50:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-43702", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/", "refsource": "MISC", "url": "https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/" }, { "name": "https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch", "refsource": "MISC", "url": "https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-43702", "datePublished": "2022-07-05T11:50:03", "dateReserved": "2021-11-15T00:00:00", "dateUpdated": "2024-08-04T04:03:08.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41345
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:01:34.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-7496-96e2c-1.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "rt-ax55_firmware", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41345", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T17:59:46.132221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T18:37:02.939Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "datePublic": "2023-11-03T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-generated module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system, or terminate services." } ], "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-generated module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system, or terminate services." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-03T07:14:55.631Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7496-96e2c-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update version to\u0026nbsp;3.0.0.4.386_51948 ." } ], "value": "Update version to\u00a03.0.0.4.386_51948 ." } ], "source": { "advisory": "TVN-202311002", "discovery": "EXTERNAL" }, "title": "ASUS RT-AX55 - command injection - 1", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2023-41345", "datePublished": "2023-11-03T04:16:47.501Z", "dateReserved": "2023-08-29T00:11:47.812Z", "dateUpdated": "2024-09-06T18:37:02.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41348
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:01:34.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-7499-63907-1.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "rt-ax55_firmware", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41348", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-05T15:47:46.461984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T18:34:47.829Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "datePublic": "2023-11-03T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its code-authentication module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." } ], "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its code-authentication module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-03T07:16:13.129Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7499-63907-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\n\nUpdate version to 3.0.0.4.386_51948 .\u003cbr\u003e" } ], "value": "\n\n\n\n\nUpdate version to 3.0.0.4.386_51948 .\n" } ], "source": { "advisory": "TVN-202311005", "discovery": "EXTERNAL" }, "title": "ASUS RT-AX55 - command injection - 4", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2023-41348", "datePublished": "2023-11-03T04:32:01.829Z", "dateReserved": "2023-08-29T00:11:47.812Z", "dateUpdated": "2024-09-06T18:34:47.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3128
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:45:51.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware \u003c 3.0.0.4.386.42095 or \u003c 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP\u0027s router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T17:41:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-3128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware \u003c 3.0.0.4.386.42095 or \u003c 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP\u0027s router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/" }, { "name": "https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/" }, { "name": "https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/", "refsource": "MISC", "url": "https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-3128", "datePublished": "2021-04-12T17:41:07", "dateReserved": "2021-01-12T00:00:00", "dateUpdated": "2024-08-03T16:45:51.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0401
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://vulncheck.com/advisories/asus-ovpn-rce | third-party-advisory |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ASUS | ExpertWiFi |
Version: 0 < 3.0.0.6.102_44544 |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:asus:rt-ax58u:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax58u", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.388_24762", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac67u:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac67u", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac68r:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac68r", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:asus:expertwifi:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "expertwifi", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.6.102_44544", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ax55:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax55", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_52303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac68u:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac68u", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ax86_series:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax86_series", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.388_24243", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac86u:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac86u", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51925", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac88u:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac88u", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.388_24209", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ax3000:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax3000", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.388_24762", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac68p:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac68p", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac1900:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac1900", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac1900u:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac1900u", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:rt-ac2900:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ac2900", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.386_51925", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:asus:zenwifi_xt8:0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "zenwifi_xt8", "vendor": "asus", "versions": [ { "lessThan": "3.0.0.4.388_24621", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-0401", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-22T14:51:52.209755Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:58:40.749Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:04:49.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://vulncheck.com/advisories/asus-ovpn-rce" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ExpertWiFi", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.6.102_44544", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386_52303", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX58U", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.388_24762", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AC67U", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AC68R", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AC68U", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386_51685", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX86 Series", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.388_24243", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AC86U", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.386_51925", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX88U", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.388_24209", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "RT-AX3000", "vendor": "ASUS", "versions": [ { "lessThan": "3.0.0.4.388_24762", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jacob Baines" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "ASUS routers supporting custom OpenVPN profiles are vulnerable to a code execution vulnerability. An authenticated and remote attacker can execute arbitrary operating system commands by uploading a crafted OVPN profile. Known affected routers include ASUS ExpertWiFi, ASUS RT-AX55, ASUS RT-AX58U, ASUS RT-AC67U, ASUS RT-AC68R, ASUS RT-AC68U, ASUS RT-AX86, ASUS RT-AC86U, ASUS RT-AX88U, and ASUS RT-AX3000.\u003cbr\u003e\u003cbr\u003e" } ], "value": "ASUS routers supporting custom OpenVPN profiles are vulnerable to a code execution vulnerability. An authenticated and remote attacker can execute arbitrary operating system commands by uploading a crafted OVPN profile. Known affected routers include ASUS ExpertWiFi, ASUS RT-AX55, ASUS RT-AX58U, ASUS RT-AC67U, ASUS RT-AC68R, ASUS RT-AC68U, ASUS RT-AX86, ASUS RT-AC86U, ASUS RT-AX88U, and ASUS RT-AX3000." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-20T16:55:18.891Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/asus-ovpn-rce" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Apply the vendor provided firmware update.\u003cbr\u003e" } ], "value": "Apply the vendor provided firmware update." } ], "source": { "discovery": "UNKNOWN" }, "title": "ASUS OVPN RCE", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2024-0401", "datePublished": "2024-05-20T16:55:18.891Z", "dateReserved": "2024-01-10T15:27:41.121Z", "dateUpdated": "2024-08-01T18:04:49.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41347
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:01:35.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "rt-ax55_firmware", "vendor": "asus", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-41347", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T20:17:23.869793Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T20:21:02.091Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RT-AX55", "vendor": "ASUS", "versions": [ { "status": "affected", "version": "3.0.0.4.386.51598" } ] } ], "datePublic": "2023-11-03T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." } ], "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-03T07:15:54.767Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\nUpdate version to 3.0.0.4.386_51948 .\u003cbr\u003e" } ], "value": "\n\n\nUpdate version to 3.0.0.4.386_51948 .\n" } ], "source": { "advisory": "TVN-202311004", "discovery": "EXTERNAL" }, "title": "ASUS RT-AX55 - command injection - 3", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2023-41347", "datePublished": "2023-11-03T04:29:39.109Z", "dateReserved": "2023-08-29T00:11:47.812Z", "dateUpdated": "2024-09-04T20:21:02.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26376
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Asuswrt-Merlin | Asuswrt-Merlin New Gen |
Version: prior to 386.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:03:32.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Asuswrt-Merlin New Gen", "vendor": "Asuswrt-Merlin", "versions": [ { "status": "affected", "version": "prior to 386.7" } ] } ], "datePublic": "2022-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2022-26376", "datePublished": "2022-08-05T21:18:47.095705Z", "dateReserved": "2022-04-05T00:00:00", "dateUpdated": "2024-09-16T22:01:42.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41436
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:28.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://asus.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-19T11:14:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://asus.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://asus.com", "refsource": "MISC", "url": "http://asus.com" }, { "name": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "name": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios", "refsource": "MISC", "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "name": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/", "refsource": "MISC", "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41436", "datePublished": "2021-11-19T11:14:09", "dateReserved": "2021-09-20T00:00:00", "dateUpdated": "2024-08-04T03:15:28.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39780
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:09.983Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/1/EN.md" }, { "tags": [ "x_transferred" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/2/EN.md" }, { "tags": [ "x_transferred" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/3/EN.md" }, { "tags": [ "x_transferred" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/4/EN.md" }, { "tags": [ "x_transferred" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/5/EN.md" }, { "tags": [ "x_transferred" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/6/EN.md" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rt-ax55", "vendor": "asus", "versions": [ { "status": "affected", "version": "v3.0.0.4.386.51598" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39780", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T15:27:29.515536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T15:30:20.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-11T18:37:52.142958", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/1/EN.md" }, { "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/2/EN.md" }, { "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/3/EN.md" }, { "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/4/EN.md" }, { "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/5/EN.md" }, { "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/6/EN.md" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-39780", "datePublished": "2023-09-11T00:00:00", "dateReserved": "2023-08-07T00:00:00", "dateUpdated": "2024-09-26T15:30:20.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386.51598 | |
asus | rt-ax55 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*", "matchCriteriaId": "0AABC778-3AC0-4730-953A-61175570FC81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." }, { "lang": "es", "value": "La funci\u00f3n relacionada con la autenticaci\u00f3n de ASUS RT-AX55 tiene una vulnerabilidad de filtrado insuficiente de caracteres especiales dentro de su m\u00f3dulo de actualizaci\u00f3n de token. Un atacante remoto autenticado puede aprovechar esta vulnerabilidad para realizar un ataque de inyecci\u00f3n de comandos para ejecutar comandos arbitrarios, interrumpir el sistema o finalizar servicios." } ], "id": "CVE-2023-41346", "lastModified": "2024-11-21T08:21:07.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-03T05:15:29.733", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA548F8-CDAF-4674-AC43-189654091622", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7599D8-8837-41B3-B25A-002B2E2147DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6363212-8299-4D57-BE46-CA307681BB5B", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7599D8-8837-41B3-B25A-002B2E2147DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DB6EF4F-D4BE-4F06-B015-DD047700D15C", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2179DE9-2382-4676-8EE6-8BABEE3C8E67", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "876963C7-D541-46A6-B71B-B7DB8A75757E", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "196B4AD6-F8B1-4E86-AB11-559DA16E731E", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A03E1DF2-F169-4B93-ABA9-D6E9693FC7A5", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F08ECBA7-6E49-4A2B-AC37-DCBBA9A36F70", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B03F1D13-38AE-4DEC-A9AE-62E7AF320EBE", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C45408C6-445F-45DE-B895-F4049D209B20", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "040306E4-72CD-4DB7-AA14-D15EC5FB9ABA", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E27ED92-86BD-4FDB-A7AF-D308AA4A14DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D35F3029-C288-4A71-8484-A7D2D9A4AFF0", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E27ED92-86BD-4FDB-A7AF-D308AA4A14DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AECA5D6E-9484-4950-899A-0CAA6F0441C1", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D118305-CAFD-425F-8352-3B241D2E7702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E66EB478-D484-4670-AA5B-A05B6BF6F958", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D118305-CAFD-425F-8352-3B241D2E7702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77409646-AD42-47D2-87E3-DB30665AEF31", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB28700C-02EB-46D0-9BAD-833CE4790264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1169F29-1B45-40FE-888C-E458F32B182A", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB28700C-02EB-46D0-9BAD-833CE4790264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF676FDB-6DE7-4869-A88B-F2FAE153866E", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C274F684-2B01-413E-9A98-7ABE9D20E43E", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEA18BE5-9A22-442B-82D0-AB17E794B4C5", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6B0EC4-797D-4059-AA90-EC09A49FE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F009F6DE-2188-411E-95FB-8610A8F6FD09", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6B0EC4-797D-4059-AA90-EC09A49FE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1750_b1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E5C4A00-D9FF-4D50-A36A-206092F4C018", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FC355D-5C81-4041-B649-EB271CA55AFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1750_b1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEB88F34-A298-4915-855C-A39E93DD3011", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FC355D-5C81-4041-B649-EB271CA55AFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EB3CD53-D4CB-4C6B-BB34-AC4048053F88", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E715D86-A7FC-415E-8C13-1ACAF9C49C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B77654C-EBD6-4EF2-93F2-71C68B422089", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E715D86-A7FC-415E-8C13-1ACAF9C49C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58EB4F6-905D-4FF9-AD2F-E8D5A387642E", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E5EEF4-D19B-41D1-86B6-F2CBB745570E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9419624C-D78F-428B-A3D0-4883D28D3BA9", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E5EEF4-D19B-41D1-86B6-F2CBB745570E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DC56C41-B6DF-4FEE-B958-2AFCADECE8BC", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E285091-0B5F-43AE-A59C-4D3439E77053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "465EE87F-C72A-46E4-8CC2-88EFBD0A5247", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E285091-0B5F-43AE-A59C-4D3439E77053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93267B3A-F1D8-45B2-9D16-738073B757A5", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2640D39-F0C3-49AA-87D1-F423150FDF2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BABFE10-3EA3-4998-9EEB-4680D9A0E4F8", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2640D39-F0C3-49AA-87D1-F423150FDF2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAAB5EF4-C425-4783-BF0D-3727D3208650", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B17C2B-A1EC-4FC1-8AB1-F35D9E3A0AA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "485EFBFC-F5EB-488C-A645-DF9CA0D428FD", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B17C2B-A1EC-4FC1-8AB1-F35D9E3A0AA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF21B730-B21A-477E-96B0-047966A3AC70", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EE62D6-1E29-4E84-8944-D3D68E212140", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "703F3249-FC55-4533-AFA5-A0F55463B187", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EE62D6-1E29-4E84-8944-D3D68E212140", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8016A389-5080-426E-B9BC-E36C6ED2EA29", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "50D22A86-7CA0-49EC-8B1D-47D6B7E8E15F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97AE35FB-905B-4639-9E37-7BA9083A9805", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "50D22A86-7CA0-49EC-8B1D-47D6B7E8E15F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac65u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD7D1A5A-92E4-4548-896A-7DFF6780E314", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac65u:-:*:*:*:*:*:*:*", "matchCriteriaId": "75F69BB5-8269-4E72-9BDE-60964F833C99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac65u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42D23E04-C9B2-4F14-986D-F1D93B427C3A", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac65u:-:*:*:*:*:*:*:*", "matchCriteriaId": "75F69BB5-8269-4E72-9BDE-60964F833C99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1696843-FBE8-42CA-A4C6-71D544717455", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5713F0F3-B616-42B7-A0D8-7983F00E79FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D84359E8-6BCD-494C-8869-A08133DDE2E7", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5713F0F3-B616-42B7-A0D8-7983F00E79FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95033F65-77A3-44D5-9631-FC8600DBC4CE", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D2F0504-2FB5-4983-BD98-8080D4BF49DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F749BAA0-C2ED-4B19-BDA1-4B8579F695EF", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D2F0504-2FB5-4983-BD98-8080D4BF49DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68rw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5EE945C-5811-439A-9F89-2F00F0463C87", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68rw:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB7509DC-0D72-4624-8970-28CC61B7DC1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68rw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8850CB55-7B56-427F-932E-98132D76058F", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68rw:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB7509DC-0D72-4624-8970-28CC61B7DC1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2F845F-D7F7-4047-B453-D640E4A0FF20", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8610683A-2297-4291-9E2D-68E608A92E2D", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A7E5A76-3770-45F3-8164-F23685CD2236", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB2F5A0-ADD6-4725-8B27-F10B5F4CEC6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A90776D8-1882-49FD-9B2D-B668BCE58F63", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB2F5A0-ADD6-4725-8B27-F10B5F4CEC6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac85u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "254CA3A7-0903-4361-90E8-E0D41A17C8BA", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac85u:-:*:*:*:*:*:*:*", "matchCriteriaId": "40933EE3-E7D1-438E-B551-892D20042593", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac85u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F62768D-C79B-4CC7-BE45-37E4B7084526", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac85u:-:*:*:*:*:*:*:*", "matchCriteriaId": "40933EE3-E7D1-438E-B551-892D20042593", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DE55DE2-53B8-44B5-91E7-EF7AEE41B5B0", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E713204-70A0-4515-8931-5D9E45ABD429", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF5784E3-CB7C-4E4F-8D50-3EF1BC431357", "versionEndExcluding": "3.0.0.4.386.42095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81008E66-B5E8-4DE5-B14D-E6983C69BC29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45677F2B-CD13-48BC-B245-8C97235A320A", "versionEndExcluding": "9.0.0.4.386.41994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81008E66-B5E8-4DE5-B14D-E6983C69BC29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware \u003c 3.0.0.4.386.42095 or \u003c 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP\u0027s router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set." }, { "lang": "es", "value": "En ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U y otros enrutadores ASUS con versiones de firmware anteriores a 3.0.0.4.386.42095 o versiones anteriores a 9.0.0.4.386.41994, cuando una IPv6 es usada, puede ocurrir un bucle de enrutamiento que genera un tr\u00e1fico excesivo de red entre un dispositivo afectado y el enrutador de su ISP aguas arriba. Esto ocurre cuando una ruta de prefijo de enlace apunta a un enlace punto a punto, una direcci\u00f3n IPv6 de destino pertenece al prefijo y no es una direcci\u00f3n IPv6 local, y un anuncio de enrutador es recibido con al menos un prefijo IPv6 \u00fanico global para el cual el flag on-link se establece" } ], "id": "CVE-2021-3128", "lastModified": "2024-11-21T06:20:56.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-12T19:15:14.830", "references": [ { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-834" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-7496-96e2c-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-7496-96e2c-1.html | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386.51598 | |
asus | rt-ax55 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*", "matchCriteriaId": "0AABC778-3AC0-4730-953A-61175570FC81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-generated module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system, or terminate services." }, { "lang": "es", "value": "La funci\u00f3n relacionada con la autenticaci\u00f3n de ASUS RT-AX55 tiene una vulnerabilidad de filtrado insuficiente de caracteres especiales dentro de su m\u00f3dulo generado por token. Un atacante remoto autenticado puede aprovechar esta vulnerabilidad para realizar un ataque de inyecci\u00f3n de comandos para ejecutar comandos arbitrarios, interrumpir el sistema o finalizar servicios." } ], "id": "CVE-2023-41345", "lastModified": "2024-11-21T08:21:07.047", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-03T05:15:29.660", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7496-96e2c-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7496-96e2c-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-7499-63907-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-7499-63907-1.html | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386.51598 | |
asus | rt-ax55 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*", "matchCriteriaId": "0AABC778-3AC0-4730-953A-61175570FC81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its code-authentication module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." }, { "lang": "es", "value": "La funci\u00f3n relacionada con la autenticaci\u00f3n de ASUS RT-AX55 tiene una vulnerabilidad de filtrado insuficiente de caracteres especiales dentro de su m\u00f3dulo de autenticaci\u00f3n de c\u00f3digo. Un atacante remoto autenticado puede aprovechar esta vulnerabilidad para realizar un ataque de inyecci\u00f3n de comandos para ejecutar comandos arbitrarios, interrumpir el sistema o finalizar servicios." } ], "id": "CVE-2023-41348", "lastModified": "2024-11-21T08:21:07.470", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-03T05:15:29.867", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7499-63907-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7499-63907-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386.51598 | |
asus | rt-ax55 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*", "matchCriteriaId": "0AABC778-3AC0-4730-953A-61175570FC81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ASUS RT-AX55\u2019s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services." }, { "lang": "es", "value": "La funci\u00f3n relacionada con la autenticaci\u00f3n de ASUS RT-AX55 tiene una vulnerabilidad de filtrado insuficiente de caracteres especiales dentro de su m\u00f3dulo de token de verificaci\u00f3n. Un atacante remoto autenticado puede aprovechar esta vulnerabilidad para realizar un ataque de inyecci\u00f3n de comandos para ejecutar comandos arbitrarios, interrumpir el sistema o finalizar servicios." } ], "id": "CVE-2023-41347", "lastModified": "2024-11-21T08:21:07.317", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-03T05:15:29.800", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386_50460 | |
asus | rt-ax55 | - | |
asus | rt-ax56u_v2_firmware | 3.0.0.4.386_50460 | |
asus | rt-ax56u_v2 | - | |
asus | rt-ac86u_firmware | 3.0.0.4_386_51529 | |
asus | rt-ac86u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:*", "matchCriteriaId": "55D08B1A-85B6-4501-8998-E308F7633DF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_v2_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:*", "matchCriteriaId": "7201F0D9-5111-414B-8756-3B36838193CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFF5EF7-E4EC-4DA0-82B4-9996087B951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4_386_51529:*:*:*:*:*:*:*", "matchCriteriaId": "E3A1AA3F-0CCF-41B0-B8D7-2D72D82C0261", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" }, { "lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de cadena de formato en la API de funci\u00f3n de cliente iperf de ASUS RT-AX56U V2. Esta vulnerabilidad se debe a la falta de validaci\u00f3n para un valor espec\u00edfico dentro de su m\u00f3dulo set_iperf3_cli.cgi. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad sin privilegios para realizar la ejecuci\u00f3n remota de c\u00f3digo arbitrario, el funcionamiento arbitrario del sistema o interrumpir el servicio." } ], "id": "CVE-2023-39240", "lastModified": "2024-11-21T08:14:58.760", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2023-09-07T08:15:07.710", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386_50460 | |
asus | rt-ax55 | - | |
asus | rt-ax56u_v2_firmware | 3.0.0.4.386_50460 | |
asus | rt-ax56u_v2 | - | |
asus | rt-ac86u_firmware | 3.0.0.4_386_51529 | |
asus | rt-ac86u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:*", "matchCriteriaId": "55D08B1A-85B6-4501-8998-E308F7633DF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_v2_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:*", "matchCriteriaId": "7201F0D9-5111-414B-8756-3B36838193CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFF5EF7-E4EC-4DA0-82B4-9996087B951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4_386_51529:*:*:*:*:*:*:*", "matchCriteriaId": "E3A1AA3F-0CCF-41B0-B8D7-2D72D82C0261", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" }, { "lang": "es", "value": "Se identific\u00f3 una vulnerabilidad de cadena de formato en la API de funci\u00f3n general de ASUS RT-AX56U V2. Esta vulnerabilidad se debe a la falta de validaci\u00f3n de un valor espec\u00edfico dentro de su m\u00f3dulo apply.cgi. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad sin privilegios para realizar la ejecuci\u00f3n remota de c\u00f3digo arbitrario, el funcionamiento arbitrario del sistema o interrumpir el servicio." } ], "id": "CVE-2023-39239", "lastModified": "2024-11-21T08:14:58.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2023-09-07T08:15:07.620", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Broken Link" ], "url": "https://https://www.twcert.org.tw/tw/cp-132-7355-0ce8d-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://https://www.twcert.org.tw/tw/cp-132-7355-0ce8d-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/ | Product, Vendor Advisory | |
cve@mitre.org | https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/ | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_xd4s_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "BEDAEEC5-E6E8-457E-8432-FD39D65BDEDC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_xd4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B3B20AB-5861-4E5F-B59E-F12D587D2AEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_xt9_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "569711EA-9CBA-4B97-BC4C-B13C93DBB70F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_xt9:-:*:*:*:*:*:*:*", "matchCriteriaId": "971A3BA4-5093-4B17-BEE6-039B12E3183E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_xd5_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "46EC6E99-DE45-492E-8BC8-8D39018B07AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_xd5:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD83FAE-D0F5-4C4B-B731-A7E28AB38581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_pro_et12_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "757EEF1F-E574-477F-A2CA-B8B69080EA30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_pro_et12:-:*:*:*:*:*:*:*", "matchCriteriaId": "126C4415-18E9-4989-88BE-BB46AD0BE096", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi__pro_xt12_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "D186B98E-4255-4D8D-BDDF-D14BD447FA32", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi__pro_xt12:-:*:*:*:*:*:*:*", "matchCriteriaId": "B77BF29C-750A-4305-89BA-D4889875D888", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ax_hybrid_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "F0790420-3761-420D-B2ED-BD8D1B38A141", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ax_hybrid:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E5CCBC4-423E-4C96-AF4A-1104ECA2E17B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_et8_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "52D3F13E-1E01-4B29-B135-F279F802C2AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_et8:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0D08073-95DA-426F-94DD-3F820180CC1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_xd6_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "106EA3E7-532A-40EB-A138-1C4214956278", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_xd6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CEAB3EB-28B7-4FB8-9ECA-3A671B51A776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ac_mini_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "55D8268F-E64E-4856-9443-0246941DA712", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ac_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "684A13D8-D0BA-499C-B3E3-E075BE05EABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ax_mini_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "B51D8BA5-6047-4EDB-B642-2068941066F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ax_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2B95883-48B9-4182-A721-8EDBF844C480", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ax_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "7E460687-9C49-40AC-8107-969820F90C51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ax:-:*:*:*:*:*:*:*", "matchCriteriaId": "54F3A1C0-2616-4E64-9704-78922DF22477", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ac_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "662CCFEE-DC9F-450D-BDC8-B185E9CD2DB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "09478D87-D059-4C9B-83BB-22D55CFC9DB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u_b1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "960791C1-B456-4DA8-B606-0988977DCE69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6B0EC4-797D-4059-AA90-EC09A49FE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax88u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "25287F79-2607-402F-879C-920360FAFA76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "7D226F86-D73A-482A-ABBD-48FDB755D137", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D118305-CAFD-425F-8352-3B241D2E7702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax89x_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "1C9DE7A3-F8B0-4785-ACAE-165F304BFF33", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax89x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F98D091B-BE82-4ED0-BA8F-DECF15A9D119", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax92u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "F9B5A898-D537-4E75-AB7A-B8311F1DF94D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EB70155-390A-472E-A0AA-59A18ADD2BF5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "84A5D3AF-D0F6-4B91-9B66-38215156F733", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB28700C-02EB-46D0-9BAD-833CE4790264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax68u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "2C03B276-5913-4EF3-9EE6-2FEA71998FAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E27ED92-86BD-4FDB-A7AF-D308AA4A14DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "7D226F86-D73A-482A-ABBD-48FDB755D137", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D118305-CAFD-425F-8352-3B241D2E7702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax3000_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "A15CDE16-255C-4A40-94A7-95C788FB2BE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax58u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "0FBE622D-B408-44B2-B7C6-24D57539FB9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "1A169487-AD9E-4F63-87EB-673B0341B890", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "7A3B2034-A825-4EE4-926F-7D871B6F9A35", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u\\+_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "34BF10C4-7822-42F6-B114-87C5EB78BFA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66u\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "609655F3-B9AE-4075-A351-9B36195541AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_rapture_gt-ac5300_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "F1F1C8AB-0A44-454A-9149-86559022F42E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_rapture_gt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FA8797-3675-479A-AFBB-AC4F25B439CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_rapture_gt-ax11000_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "ED377F42-5880-487E-A942-EC9B109CB69D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_rapture_gt-ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "990862C8-4B83-4C35-88E2-91186E52C6D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_rapture_gt-ac2900_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "C9153836-7577-44AE-ACD1-DC8991A77D28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_rapture_gt-ac2900:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F9DBAB2-B19E-44DC-AAB8-964E3552D6FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1300uhp_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "0B8FFBE7-4B92-488A-915B-1C5598D81FD0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1300uhp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C54B97C8-B312-4A17-BBF1-7381D28912B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1300g\\+_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "FD1E8C93-1633-4118-85FA-120B962AE214", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1300g\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ECDCBA1-4198-40C0-B9D7-170BC2AB8261", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_gaming_ax5400_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "0D790FA3-E1B3-46CE-BB52-611CC4CF91A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_gaming_ax5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E77AB7A-918A-4337-A757-CD1083CCCDF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_gaming_ax3000_v2_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "7497F325-BD79-432B-82E0-628CA7E51CA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_gaming_ax3000_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B78882B-11A8-46D9-A425-1ACAE6EF7CDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1200_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "E1864563-DEBF-412B-8763-58161F6D309D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1200:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BE19DF1-EB89-4CE5-956F-79BD4AD5E52F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac5300_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "7BEA8F8C-0A72-42C9-A456-A9A4CACD2CB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "55EE62D6-1E29-4E84-8944-D3D68E212140", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1200g_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "6FBF2427-0F6A-461B-8B03-D23A6C3BF404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF74439-AD6D-4BBB-9254-640170FE1CF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1200hp_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "850E8DCA-6B59-4F03-97B8-0A332B025987", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1200hp:-:*:*:*:*:*:*:*", "matchCriteriaId": "37EA4BB5-7F63-4CD5-9F66-7EC0BB901FC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1200g\\+_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "0F2F3B5D-C56E-4391-A71B-C1B58E308FBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1200g\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F0A7BAC-63CD-4758-9463-211574486A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1200e_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "458E3EB7-EF12-43BD-8956-9E892C886AAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1200e:-:*:*:*:*:*:*:*", "matchCriteriaId": "28248D9F-07A8-4FBF-818D-B76DB38854FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1200gu_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "52D88F76-7B33-4B37-B057-D1B7F7A8D363", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1200gu:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C1CC84A-95E3-4F28-B831-040619426244", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac3100_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "2915225A-086C-4585-BF59-D6E075C78197", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B17C2B-A1EC-4FC1-8AB1-F35D9E3A0AA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac58u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "5E50CFD0-2B4C-4D77-9A32-03D0474D91E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "50D22A86-7CA0-49EC-8B1D-47D6B7E8E15F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac88u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "8C33813E-EA85-4F4E-9FE7-997267884BB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81008E66-B5E8-4DE5-B14D-E6983C69BC29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac56u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "775AB1CB-F843-4262-AB43-BC13AA298CEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E87BA7-FACD-46B2-BE2A-9EFEA3C62C17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac56r_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "C72E066D-30CB-49E9-8C10-7C4C453E2813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac56r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32874C8-05B6-44A1-B118-DC2F4FE62134", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac56s_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "BBCD73E0-9220-49F9-AA7B-B2AF132051CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac56s:-:*:*:*:*:*:*:*", "matchCriteriaId": "63A1E548-F12D-4BF7-9C01-1325A725FF91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac3200_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "3303372F-E52E-4756-B205-773B77DCC24B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFE8A3B1-284B-40EC-872E-B8F7103F108C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac55u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "8F75EF51-9844-4D74-884A-7C04AFF6C310", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac55u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7DF43D-7EEE-405C-BB2B-822936BCB4A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac2900_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "F7C9E5F6-5402-427C-A85F-D82B0D4E1DF2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2640D39-F0C3-49AA-87D1-F423150FDF2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac55uhp_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "ABAA43C6-2DBA-4ADF-8773-9C25A0DDEE9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac55uhp:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69102D-EF9E-4E84-B9FA-9049F7816E26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac2600_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "9DC73139-1865-4E6C-9A4F-E4F79B1FE9CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "985B5B75-7936-413C-A4DD-608E1378718A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac53_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "116B31F2-6DCD-4342-BE0C-7FCADEBBAF87", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac53:-:*:*:*:*:*:*:*", "matchCriteriaId": "E09FFA25-CEE0-4529-A4F3-A93D23CB26F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac2400_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "3926212A-CA52-48FD-BE4D-A1B656BCF133", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac2400:-:*:*:*:*:*:*:*", "matchCriteriaId": "56484DE8-0DBE-40E5-A652-8438CD1EF9A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac52u_b1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "6845A682-26C6-4E80-B0F4-B400B1EB7AC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac52u_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "959BF67B-D5CF-4E55-981F-56149DCCC927", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac2200_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "8F2F84B7-B8D0-4A7D-ACE4-EBA4FDADF85E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac2200:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0ADA8C-58FE-4EDD-B979-FF02639A79A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac51u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "C1525164-721B-4A5D-8BC1-036CEF01AA72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:*", "matchCriteriaId": "24748D40-7F43-44DA-BBEF-46D85D2AADA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac51u\\+_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "4E3F816D-560D-4B7F-8CC0-CED83EB6C45B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac51u\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "A56B3D13-D0A5-482C-9E40-173EF23DA849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac87u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "958A0324-8CEE-433D-9E10-FBFFF83B5D2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac87u:-:*:*:*:*:*:*:*", "matchCriteriaId": "317B2498-88CE-431F-97E1-EFE7F7E34E05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac87r_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "D7BD3267-CA06-4AF0-838C-6022242B0A9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac87r:-:*:*:*:*:*:*:*", "matchCriteriaId": "34D91D22-049E-46BB-A85D-D9FDD81BCAB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-acrh17_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "049ACFBB-76CE-450F-8F33-5C5CAE3FCF36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-acrh17:-:*:*:*:*:*:*:*", "matchCriteriaId": "137B2237-4581-4894-A36A-DE49C96CB80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "5D3E1E2F-BDFF-43CB-ACED-90386148F25E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-acrh13_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "E91F2C90-9924-4A5B-B480-9359D65D4997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-acrh13:-:*:*:*:*:*:*:*", "matchCriteriaId": "41AF79B6-D208-4357-A08D-D1AB6F136F59", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac85u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "C28ADB3C-23C9-463C-9005-4641B3D54817", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac85u:-:*:*:*:*:*:*:*", "matchCriteriaId": "40933EE3-E7D1-438E-B551-892D20042593", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n66u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "D653C25C-CE16-4CFA-9D14-790D95B9E3A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A60BB38-11FC-48C4-B592-29C6C3A6FEAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n66r_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "90714873-F25D-498F-B4B8-09F0BD3810E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB4466BA-09EB-43F0-9610-6574F10B5810", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n66w_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "549EF224-94AE-4226-88D2-DB70671B5EFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n66w:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAB181BD-4C90-44F4-9E43-1230C2455243", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n66c1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "9D6EA4E6-F589-43A1-BB57-995F8A79CBA0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n66c1:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B08A821-2DDD-4B4E-991D-7A683073D3F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac85p_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "822329E4-C623-444A-84D1-0B729E0D82C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac85p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D268AD1-5F24-46CE-8E23-B24ECE6D049A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n18u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "A2284A76-5377-42B1-A7FB-21718E3623B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n18u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB744DE5-64DB-4EFF-A23C-EE9BB57A36C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac65p_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "08853311-7B1D-475E-BF65-4C833DE6B865", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac65p:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B9BA5F5-E43D-4187-9BED-4A71BA4E4974", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n19_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "006A39FA-D10A-47DB-8EA8-1F7735CDE42B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n19:-:*:*:*:*:*:*:*", "matchCriteriaId": "507A5D4D-CAF9-4417-9EA6-B499E04D1CDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac57u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "D118329C-B834-4D68-8A11-46771DC2EA7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac57u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F42D43F-C52B-4809-9E08-5F908DF0E67D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n14uhp_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "06E53E35-1576-470B-9CBB-9D59B9332A7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n14uhp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE76A8DF-A914-4700-8EE2-29CD4205F4B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "BB6A2CA4-91BB-4500-8733-9205E7FFB3D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E23D00B-76E3-438C-8023-3D7CC6AEEE15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68r_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "97254DEB-10C1-4020-8E7A-E2088A774DB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D2F0504-2FB5-4983-BD98-8080D4BF49DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68p_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "FFA9DBF2-5A51-47D3-A428-6E20D8472EAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5713F0F3-B616-42B7-A0D8-7983F00E79FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68w_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "264E599A-8E85-43B7-90AF-B6CE6441B992", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68w:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB2F5A0-ADD6-4725-8B27-F10B5F4CEC6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac68uf_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "4D207FED-F8B3-4330-B79C-CA28485B6B41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac68uf:-:*:*:*:*:*:*:*", "matchCriteriaId": "85422660-7559-4ED0-8ED3-DF928C50FD4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n12e_b1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "0921E20F-8495-4543-B202-A362E8ADB8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n12e_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "992A3E02-BBC4-4738-AF26-5278E31F1F08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n12e_c1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "CC9E35F7-FAD2-4941-98C7-2AE5FCC0881A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n12e_c1:-:*:*:*:*:*:*:*", "matchCriteriaId": "D17BCFEC-0436-48F0-BE18-3A2018D0A5C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac65u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "7D6CC243-6267-4AB0-824E-96FE4C21284B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac65u:-:*:*:*:*:*:*:*", "matchCriteriaId": "75F69BB5-8269-4E72-9BDE-60964F833C99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n12hp_b1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "A8D4E0FF-1E2C-4576-B5AB-B9A1ABECDF9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n12hp_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FF2DDFE-344F-4A69-B347-0A29512EE5BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "109295F0-5525-449A-991C-18004AAEFCB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E715D86-A7FC-415E-8C13-1ACAF9C49C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n12vp_b1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "E69AA872-568F-4F6D-9715-1ED1A4E2C8D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n12vp_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB81E20-E712-4F44-832C-8A7503316164", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900p_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "B344B5B3-D690-4639-815C-62B6024D5B56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E5EEF4-D19B-41D1-86B6-F2CBB745570E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1900u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "C38788F7-3288-47B3-8793-98E16D7D758A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1900u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E285091-0B5F-43AE-A59C-4D3439E77053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n12\\+_b1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "83A102DA-FA2E-4F02-890B-1BAA599A16FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n12\\+_b1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C77F3227-992F-4F53-86CC-DDD842B6C6C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1750_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "78B5BD13-0EA3-465A-BF46-21A242CF6977", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*", "matchCriteriaId": "59001E8D-E835-464A-915A-AAF59F2F397F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-n12d1_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "394D1205-366E-4F95-9D84-F083F61B24CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-n12d1:-:*:*:*:*:*:*:*", "matchCriteriaId": "06E99301-3EC0-4E09-AB00-A0AB1AC0AA97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac1750_b1__firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "4DD5E72B-CF7A-4EAB-9F4C-64BE953029F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac1750_b1_:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8D10D10-1F57-4157-89BD-A711D3024B10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:4g-ac53u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "6FBED666-37F7-49B4-BBDB-7999FC82AF12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:4g-ac53u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B3381A1-5169-4DA9-BC6F-8FDBD7090FC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "18ED9E0E-2E5A-4FB0-86A8-E452D385F8B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED39CBC-80ED-4037-9285-4D4CFA45F00E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66r_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "41A6A080-7612-4AF2-AF1E-339E00B9A889", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D59C40A-D9BA-455B-9F9E-D3B6FB80BC13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac66w_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "9B4ECE7F-6173-4637-85DF-7B44EA41FFA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac66w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D988AC4-60B7-4388-8589-A04CACC2CB31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:4g-ac68u_firmware:3.0.0.4.386.46061:*:*:*:*:*:*:*", "matchCriteriaId": "5250DC13-AC0E-4E95-9450-AAF420E5E2C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:4g-ac68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "46317EAB-C1A9-4811-9DB4-767A58E92A3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device." }, { "lang": "es", "value": "ASUS RT-A88U versi\u00f3n 3.0.0.4.386_45898 es vulnerable a un ataque de tipo Cross Site Scripting (XSS).\u0026#xa0;El panel de administraci\u00f3n del enrutador ASUS no desinfecta los registros de WiFI correctamente, si un atacante pudiera cambiar el SSID del enrutador con una carga \u00fatil personalizada, podr\u00eda obtener XSS almacenado en el dispositivo" } ], "id": "CVE-2021-43702", "lastModified": "2024-11-21T06:29:39.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-05T12:15:07.830", "references": [ { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/uk/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC88U/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511 | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | asuswrt | * | |
asuswrt-merlin | new_gen | * | |
asus | xt8_firmware | * | |
asus | xt8 | - | |
asus | tuf-ax3000_v2_firmware | * | |
asus | tuf-ax3000_v2 | - | |
asus | xd4_firmware | * | |
asus | xd4 | - | |
asus | et12_firmware | * | |
asus | et12 | - | |
asus | gt-ax6000_firmware | * | |
asus | gt-ax6000 | - | |
asus | xt12_firmware | * | |
asus | xt12 | - | |
asus | rt-ax58u_firmware | * | |
asus | rt-ax58u | - | |
asus | xt9_firmware | * | |
asus | xt9 | - | |
asus | xd6_firmware | * | |
asus | xd6 | - | |
asus | gt-ax11000_pro_firmware | * | |
asus | gt-ax11000_pro | - | |
asus | gt-axe16000_firmware | * | |
asus | gt-axe16000 | - | |
asus | rt-ax86u_firmware | * | |
asus | rt-ax86u | - | |
asus | rt-ax68u_firmware | * | |
asus | rt-ax68u | - | |
asus | rt-ax82u_firmware | * | |
asus | rt-ax82u | - | |
asus | rt-ax56u_firmware | * | |
asus | rt-ax56u | - | |
asus | rt-ax55_firmware | * | |
asus | rt-ax55 | - | |
asus | gt-ax11000_firmware | * | |
asus | gt-ax11000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:asuswrt:*:*:*:*:*:*:*:*", "matchCriteriaId": "F08F0BFE-E5AF-4991-A543-C879E7920B1A", "versionEndExcluding": "3.0.0.4.386_48706", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asuswrt-merlin:new_gen:*:*:*:*:*:*:*:*", "matchCriteriaId": "56FA1FDB-6F85-429C-BF43-E60F1BF8BDB7", "versionEndExcluding": "386.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:xt8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B1A968A-7E66-43F0-9E98-0EE71E6E8291", "versionEndExcluding": "3.0.0.4.386_48706", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:xt8:-:*:*:*:*:*:*:*", "matchCriteriaId": "37EEF2AE-074D-403B-B606-6C2CE88AD3B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf-ax3000_v2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E797BD3C-28F5-495C-87DE-B6F42F80270E", "versionEndExcluding": "3.0.0.4.386_48750", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf-ax3000_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D03C2C9-2EE8-47B9-9950-75C8A887C22C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:xd4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2664F674-B251-4525-BCBE-74841A2FC8A5", "versionEndExcluding": "3.0.0.4.386_48790", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:xd4:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABBBB0A6-CDA7-47E1-B154-B7D6DE70D973", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:et12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CA3A839-66DD-48A9-B14A-DA328EC5A96B", "versionEndExcluding": "3.0.0.4.386_48823", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:et12:-:*:*:*:*:*:*:*", "matchCriteriaId": "02E71310-9771-4D30-A202-1ADF5533960A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:gt-ax6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C628CA52-9224-4793-968B-5E452A09DA69", "versionEndExcluding": "3.0.0.4.386_48823", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ax6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B5FD80-66EC-42B3-AD9E-73C8BEDFB71E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:xt12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E78AD82E-F3A4-4A95-8AED-93A29AD945D6", "versionEndExcluding": "3.0.0.4.386_48823", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:xt12:-:*:*:*:*:*:*:*", "matchCriteriaId": "C67E3C2D-1090-4C72-AAE8-89AE8E997533", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8621573-D08C-4F11-9C6E-335EF7B84C60", "versionEndExcluding": "3.0.0.4.386_48908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:xt9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C9248D5-5BD4-41F5-8F97-0D57DFB083DC", "versionEndExcluding": "3.0.0.4.388_20027", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:xt9:-:*:*:*:*:*:*:*", "matchCriteriaId": "74B737E9-4218-435F-A6B1-980B2090BA8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:xd6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "071652E7-585F-4071-A48E-2A94AEF1E1D4", "versionEndExcluding": "3.0.0.4.386_49356", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:xd6:-:*:*:*:*:*:*:*", "matchCriteriaId": "727481D1-6673-4671-B970-87C6A22706CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:gt-ax11000_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6013420E-9504-456C-A4FD-8C62D1948AB0", "versionEndExcluding": "3.0.0.4.386_48996", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ax11000_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "140087CE-0EBB-469D-956E-5BECA5AB5CBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:gt-axe16000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4336BA99-3693-4CF5-B301-C06EFC75B3B6", "versionEndExcluding": "3.0.0.4.386_48786", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-axe16000:-:*:*:*:*:*:*:*", "matchCriteriaId": "576BB6E0-D4E3-40EB-8212-B78946FB5082", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BED51697-4045-4551-9BDB-C8795ABB5A6E", "versionEndExcluding": "3.0.0.4.386_49447", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB28700C-02EB-46D0-9BAD-833CE4790264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E702F9E7-BB84-4B3C-8EFE-D6AE16D44C63", "versionEndExcluding": "3.0.0.4.386_49479", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E27ED92-86BD-4FDB-A7AF-D308AA4A14DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAA6BB79-7908-494E-AF2A-D5A05B9D73BF", "versionEndExcluding": "3.0.0.4.386_49380", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D118305-CAFD-425F-8352-3B241D2E7702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96356DF5-2C7A-47E8-AA6B-BE9DB1A7CF03", "versionEndExcluding": "3.0.0.4.386_49559", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40C64C0C-0D63-4262-9D31-EC560A084548", "versionEndExcluding": "3.0.0.4.386_49559", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:gt-ax11000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F1F38CC-78E1-43C7-B855-C79294061B3F", "versionEndExcluding": "3.0.0.4.386_49559", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC02F598-C10E-4C77-9BE9-CB3660893C5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de corrupci\u00f3n de memoria en la funcionalidad httpd unescape de Asuswrt versiones anteriores a 3.0.0.4.386_48706 y Asuswrt-Merlin New Gen versiones anteriores a 386.7. Una petici\u00f3n HTTP especialmente dise\u00f1ada puede conllevar a una corrupci\u00f3n de memoria. Un atacante puede enviar una petici\u00f3n de red para desencadenar esta vulnerabilidad" } ], "id": "CVE-2022-26376", "lastModified": "2024-11-21T06:53:52.570", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-05T22:15:11.143", "references": [ { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "talos-cna@cisco.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | gt-axe11000_firmware | * | |
asus | gt-axe11000 | - | |
asus | rt-ax3000_firmware | * | |
asus | rt-ax3000 | - | |
asus | rt-ax55_firmware | * | |
asus | rt-ax55 | - | |
asus | rt-ax58u_firmware | * | |
asus | rt-ax58u | - | |
asus | tuf-ax3000_firmware | * | |
asus | tuf-ax3000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:gt-axe11000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6831981E-FCDC-4F91-AA49-38C764C4F49E", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-axe11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C08C95C-E4AC-41B3-B8F6-F99BA8319F12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "604BBFB4-FF96-46F9-B407-C3D9CBE73BE8", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0BBE7AA-081C-48A7-AAC1-481538AEFECA", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD025F49-2590-4E99-9D63-9A5A28BF4B1F", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf-ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A27F57A-8A07-4BD0-BD6E-8384693532A3", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2691AD6-CA0D-41AB-AEDB-2DFED44678CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users\u0027 connections by sending specially crafted SAE authentication frames." }, { "lang": "es", "value": "El protocolo de acceso protegido Wi-Fi de los routers ASUS (WPA2 y WPA3-SAE), presenta un control inapropiado de la vulnerabilidad de la frecuencia de interacci\u00f3n, un atacante no autenticado puede desconectar remotamente las conexiones de otros usuarios enviando tramas de autenticaci\u00f3n SAE especialmente dise\u00f1adas" } ], "id": "CVE-2021-37910", "lastModified": "2024-11-21T06:16:02.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "twcert@cert.org.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T02:15:06.640", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-799" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386.51598 | |
asus | rt-ax55 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386.51598:*:*:*:*:*:*:*", "matchCriteriaId": "0AABC778-3AC0-4730-953A-61175570FC81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability." }, { "lang": "es", "value": "Se descubri\u00f3 que ASUS RT-AX55 v3.0.0.4.386.51598 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos autenticados." } ], "id": "CVE-2023-39780", "lastModified": "2024-11-21T08:15:55.993", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-11T19:15:43.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/1/EN.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/2/EN.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/3/EN.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/4/EN.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/5/EN.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/6/EN.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/1/EN.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/2/EN.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/3/EN.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/4/EN.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/5/EN.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/6/EN.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:gt-ax11000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5B16842-6E75-42F9-BED2-37966FB900FF", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC02F598-C10E-4C77-9BE9-CB3660893C5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "604BBFB4-FF96-46F9-B407-C3D9CBE73BE8", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0BBE7AA-081C-48A7-AAC1-481538AEFECA", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36430A0B-7A71-4FB2-9159-6EE9C8B7DADE", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_v2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B24819D6-17F8-4ABD-8F85-DBB1C559759D", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFF5EF7-E4EC-4DA0-82B4-9996087B951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD025F49-2590-4E99-9D63-9A5A28BF4B1F", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88B9EE48-348F-4358-B89B-35F111466254", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D118305-CAFD-425F-8352-3B241D2E7702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0364A944-662E-4074-AA9A-3ACAB7A79888", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A62A40-F182-48D2-B6BA-B39632A5E92A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0364A944-662E-4074-AA9A-3ACAB7A79888", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A62A40-F182-48D2-B6BA-B39632A5E92A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D136BA5-1B89-4B27-81E6-A5ED861DF21D", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB28700C-02EB-46D0-9BAD-833CE4790264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44ED1540-9D3B-4E1E-867C-B639D7903B02", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FC13C9-ADF3-4ED7-BDE2-FEAEC6248BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_zaku_ii_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57AB9331-9565-42AC-B5C4-CE8A4849E285", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u_zaku_ii_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "57414ED4-B1E2-475D-9678-A0675439A80C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "781AB112-C281-4660-B494-36DBB84AF690", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax92u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB2DBB8-8782-418E-8CEB-0041694517F6", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EB70155-390A-472E-A0AA-59A18ADD2BF5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_gaming_ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5D4B2F3-C4BC-4B68-9D67-261B9EFAA11A", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_gaming_ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF2B2BEB-574D-4D02-B15E-1A6B737B06C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf-ax5400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3B3959B-D5FC-4AC1-A8A9-544747178417", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf-ax5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "0819A22E-2913-4C13-A67D-6130E10544BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_xd6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F49747-32C4-4B4C-B9C6-90D3948ADABE", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_xd6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CEAB3EB-28B7-4FB8-9ECA-3A671B51A776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24F0C238-58D9-4721-A8B5-CA8C6F8CE445", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7599D8-8837-41B3-B25A-002B2E2147DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A896450-3FC2-4386-8157-4B1CB2DCA66D", "versionEndExcluding": "3.0.0.4.386.45911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E27ED92-86BD-4FDB-A7AF-D308AA4A14DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request." }, { "lang": "es", "value": "Una omisi\u00f3n de protecci\u00f3n por fuerza bruta en la protecci\u00f3n CAPTCHA en ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) versiones anteriores a 3.0.4.386. 0.0.4.386.45898, y RT-AX68U versiones anteriores a 3.0.0.4.386.45911, permite a un atacante remoto intentar cualquier n\u00famero de intentos de inicio de sesi\u00f3n por medio del env\u00edo de una petici\u00f3n HTTP espec\u00edfica" } ], "id": "CVE-2021-41435", "lastModified": "2024-11-21T06:26:14.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-19T12:15:09.330", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://asus.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://asus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-307" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
asus | rt-ax55_firmware | 3.0.0.4.386_50460 | |
asus | rt-ax55 | - | |
asus | rt-ax56u_v2_firmware | 3.0.0.4.386_50460 | |
asus | rt-ax56u_v2 | - | |
asus | rt-ac86u_firmware | 3.0.0.4_386_51529 | |
asus | rt-ac86u | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:*", "matchCriteriaId": "55D08B1A-85B6-4501-8998-E308F7633DF9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_v2_firmware:3.0.0.4.386_50460:*:*:*:*:*:*:*", "matchCriteriaId": "7201F0D9-5111-414B-8756-3B36838193CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFF5EF7-E4EC-4DA0-82B4-9996087B951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4_386_51529:*:*:*:*:*:*:*", "matchCriteriaId": "E3A1AA3F-0CCF-41B0-B8D7-2D72D82C0261", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "89095282-ABBD-4056-B731-7F05638DB1A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value\u00a0within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.\n\n" }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad de cadena de formato en ASUS RT-AX56U V2. Esta vulnerabilidad se debe a la falta de validaci\u00f3n de un valor espec\u00edfico dentro de su m\u00f3dulo set_iperf3_svr.cgi. Un atacante remoto no autenticado puede aprovechar esta vulnerabilidad sin privilegios para realizar la ejecuci\u00f3n remota de c\u00f3digo arbitrario, el funcionamiento arbitrario del sistema o interrumpir el servicio." } ], "id": "CVE-2023-39238", "lastModified": "2024-11-21T08:14:58.463", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2023-09-07T08:15:07.533", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:gt-ax11000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5B16842-6E75-42F9-BED2-37966FB900FF", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC02F598-C10E-4C77-9BE9-CB3660893C5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "604BBFB4-FF96-46F9-B407-C3D9CBE73BE8", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1515AF83-732F-489B-A25C-5D67A03A3B25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0BBE7AA-081C-48A7-AAC1-481538AEFECA", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F27D4F-EDC4-4676-8C66-545378850BF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36430A0B-7A71-4FB2-9159-6EE9C8B7DADE", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D747097-702E-4046-9723-01A586336534", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax56u_v2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B24819D6-17F8-4ABD-8F85-DBB1C559759D", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFF5EF7-E4EC-4DA0-82B4-9996087B951F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD025F49-2590-4E99-9D63-9A5A28BF4B1F", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*", "matchCriteriaId": "855509B2-CE29-4A04-B412-C160139EA392", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88B9EE48-348F-4358-B89B-35F111466254", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D118305-CAFD-425F-8352-3B241D2E7702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0364A944-662E-4074-AA9A-3ACAB7A79888", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A62A40-F182-48D2-B6BA-B39632A5E92A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0364A944-662E-4074-AA9A-3ACAB7A79888", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A62A40-F182-48D2-B6BA-B39632A5E92A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D136BA5-1B89-4B27-81E6-A5ED861DF21D", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB28700C-02EB-46D0-9BAD-833CE4790264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44ED1540-9D3B-4E1E-867C-B639D7903B02", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FC13C9-ADF3-4ED7-BDE2-FEAEC6248BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax86u_zaku_ii_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57AB9331-9565-42AC-B5C4-CE8A4849E285", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax86u_zaku_ii_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "57414ED4-B1E2-475D-9678-A0675439A80C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "781AB112-C281-4660-B494-36DBB84AF690", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB91E047-5AE1-4CA0-9E67-84170D79770C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax92u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB2DBB8-8782-418E-8CEB-0041694517F6", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EB70155-390A-472E-A0AA-59A18ADD2BF5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_gaming_ax3000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5D4B2F3-C4BC-4B68-9D67-261B9EFAA11A", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_gaming_ax3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF2B2BEB-574D-4D02-B15E-1A6B737B06C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf-ax5400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3B3959B-D5FC-4AC1-A8A9-544747178417", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf-ax5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "0819A22E-2913-4C13-A67D-6130E10544BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_xd6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F49747-32C4-4B4C-B9C6-90D3948ADABE", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_xd6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CEAB3EB-28B7-4FB8-9ECA-3A671B51A776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24F0C238-58D9-4721-A8B5-CA8C6F8CE445", "versionEndExcluding": "3.0.0.4.386.45898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7599D8-8837-41B3-B25A-002B2E2147DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A896450-3FC2-4386-8157-4B1CB2DCA66D", "versionEndExcluding": "3.0.0.4.386.45911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E27ED92-86BD-4FDB-A7AF-D308AA4A14DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet." }, { "lang": "es", "value": "Un contrabando de peticiones HTTP en la aplicaci\u00f3n web en ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) versiones anteriores a 3.0.4.386. 0.0.4.386.45898, y RT-AX68U versiones anteriores a 3.0.0.4.386.45911, permite a un atacante remoto no autenticado hacer DoS por medio del env\u00edo de un paquete HTTP especialmente dise\u00f1ado" } ], "id": "CVE-2021-41436", "lastModified": "2024-11-21T06:26:15.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-19T12:15:09.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://asus.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://asus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-XD6/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX3000/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX68U/HelpDesk_BIOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/All-series/RT-AX55/HelpDesk_BIOS/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-444" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202309-0437
Vulnerability from variot
It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202309-0437", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax56u v2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_50460" }, { "model": "rt-ax55", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_50460" }, { "model": "rt-ac86u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4_386_51529" }, { "model": "rt-ac86u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u v2", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "db": "NVD", "id": "CVE-2023-39239" } ] }, "cve": "CVE-2023-39239", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "twcert@cert.org.tw", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-39239", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2023-011976", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "twcert@cert.org.tw", "id": "CVE-2023-39239", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2023-011976", "trust": 0.8, "value": "High" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "db": "NVD", "id": "CVE-2023-39239" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2023-39239" }, { "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "db": "VULMON", "id": "CVE-2023-39239" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-39239", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2023-011976", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-39239", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-39239" }, { "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "db": "NVD", "id": "CVE-2023-39239" } ] }, "id": "VAR-202309-0437", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.2879902 }, "last_update_date": "2024-08-14T14:36:37.090000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.0 }, { "problemtype": "Format string problem (CWE-134) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "db": "NVD", "id": "CVE-2023-39239" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://https://www.twcert.org.tw/tw/cp-132-7355-0ce8d-1.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-39239" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/134.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-39239" }, { "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "db": "NVD", "id": "CVE-2023-39239" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-39239" }, { "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "db": "NVD", "id": "CVE-2023-39239" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-07T00:00:00", "db": "VULMON", "id": "CVE-2023-39239" }, { "date": "2023-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "date": "2023-09-07T08:15:07.620000", "db": "NVD", "id": "CVE-2023-39239" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-07T00:00:00", "db": "VULMON", "id": "CVE-2023-39239" }, { "date": "2024-05-31T05:32:00", "db": "JVNDB", "id": "JVNDB-2023-011976" }, { "date": "2024-03-27T08:15:37.867000", "db": "NVD", "id": "CVE-2023-39239" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0ASUSTeK\u00a0Computer\u00a0Inc.\u00a0 Product Format String Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011976" } ], "trust": 0.8 } }
var-202309-0729
Vulnerability from variot
ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability. ASUS RT-AX55 is a dual-band Wi-Fi router from the Chinese company ASUS. This vulnerability is caused by the application's failure to properly filter special characters, commands, etc. in constructed commands. An attacker could exploit this vulnerability to cause arbitrary command execution
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202309-0729", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax55", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.51598" }, { "model": "rt-ax55", "scope": "eq", "trust": 0.6, "vendor": "asus", "version": "v3.0.0.4.386.51598" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-70089" }, { "db": "NVD", "id": "CVE-2023-39780" } ] }, "cve": "CVE-2023-39780", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2023-70089", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2023-39780", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-39780", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2023-70089", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-70089" }, { "db": "NVD", "id": "CVE-2023-39780" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability. ASUS RT-AX55 is a dual-band Wi-Fi router from the Chinese company ASUS. This vulnerability is caused by the application\u0027s failure to properly filter special characters, commands, etc. in constructed commands. An attacker could exploit this vulnerability to cause arbitrary command execution", "sources": [ { "db": "NVD", "id": "CVE-2023-39780" }, { "db": "CNVD", "id": "CNVD-2023-70089" }, { "db": "VULMON", "id": "CVE-2023-39780" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-39780", "trust": 1.7 }, { "db": "CNVD", "id": "CNVD-2023-70089", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2023-39780", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-70089" }, { "db": "VULMON", "id": "CVE-2023-39780" }, { "db": "NVD", "id": "CVE-2023-39780" } ] }, "id": "VAR-202309-0729", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2023-70089" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-70089" } ] }, "last_update_date": "2024-08-14T14:30:17.598000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2023-39780" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://github.com/d2y6p/cve/blob/main/asus/cve-2023-39780/5/en.md" }, { "trust": 1.1, "url": "https://github.com/d2y6p/cve/blob/main/asus/cve-2023-39780/1/en.md" }, { "trust": 1.1, "url": "https://github.com/d2y6p/cve/blob/main/asus/cve-2023-39780/3/en.md" }, { "trust": 1.1, "url": "https://github.com/d2y6p/cve/blob/main/asus/cve-2023-39780/6/en.md" }, { "trust": 1.1, "url": "https://github.com/d2y6p/cve/blob/main/asus/cve-2023-39780/4/en.md" }, { "trust": 1.1, "url": "https://github.com/d2y6p/cve/blob/main/asus/cve-2023-39780/2/en.md" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-39780" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2023-70089" }, { "db": "VULMON", "id": "CVE-2023-39780" }, { "db": "NVD", "id": "CVE-2023-39780" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2023-70089" }, { "db": "VULMON", "id": "CVE-2023-39780" }, { "db": "NVD", "id": "CVE-2023-39780" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-14T00:00:00", "db": "CNVD", "id": "CNVD-2023-70089" }, { "date": "2023-09-11T00:00:00", "db": "VULMON", "id": "CVE-2023-39780" }, { "date": "2023-09-11T19:15:43.190000", "db": "NVD", "id": "CVE-2023-39780" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-18T00:00:00", "db": "CNVD", "id": "CNVD-2023-70089" }, { "date": "2023-09-12T00:00:00", "db": "VULMON", "id": "CVE-2023-39780" }, { "date": "2023-09-14T17:43:36.990000", "db": "NVD", "id": "CVE-2023-39780" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS RT-AX55 command injection vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2023-70089" } ], "trust": 0.6 } }
var-202111-1223
Vulnerability from variot
An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet. plural ASUS The product has HTTP There is a vulnerability related to request smuggling.Service operation interruption (DoS) It may be in a state. ASUS routers is a router from ASUS, Taiwan, China.
ASUS routers has a security vulnerability. The vulnerability stems from a problem with the router firmware verifying HTTP data packets. Unauthenticated remote attackers can use this vulnerability to perform denial of service attacks by sending specially crafted HTTP data packets
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1223", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax88u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "tuf gaming ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86s", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "zenwifi ax \\", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax82u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax56u v2", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax92u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86u zaku ii edition", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "zenwifi xd6", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax56u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45911" }, { "model": "gt-ax11000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "tuf-ax5400", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax82u gundam edition", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax55", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u v2", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax82u gundam edition", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax86u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax3000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax82u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax86s", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "gt-ax11000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "routers", "scope": null, "trust": 0.6, "vendor": "asus", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "cve": "CVE-2021-41436", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-41436", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-99877", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-41436", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-41436", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-41436", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-41436", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-99877", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1643", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-41436", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet. plural ASUS The product has HTTP There is a vulnerability related to request smuggling.Service operation interruption (DoS) It may be in a state. ASUS routers is a router from ASUS, Taiwan, China. \n\r\n\r\nASUS routers has a security vulnerability. The vulnerability stems from a problem with the router firmware verifying HTTP data packets. Unauthenticated remote attackers can use this vulnerability to perform denial of service attacks by sending specially crafted HTTP data packets", "sources": [ { "db": "NVD", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41436", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-015289", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-99877", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1643", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-41436", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "id": "VAR-202111-1223", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" } ], "trust": 1.09064731125 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" } ] }, "last_update_date": "2024-11-23T22:33:00.034000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RT-AX68U ASUS", "trust": 0.8, "url": "https://www.asus.com/jp/" }, { "title": "Patch for ASUS routers environmental issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/305656" }, { "title": "ASUS routers Remediation measures for environmental problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171131" }, { "title": "", "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-444", "trust": 1.0 }, { "problemtype": "HTTP Request Smuggling (CWE-444) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41436" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax56u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-ax-xt8-/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/all-series/rt-ax55/helpdesk_bios/" }, { "trust": 1.7, "url": "http://asus.com" }, { "trust": 1.7, "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax68u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-xd6/helpdesk_bios/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/444.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2021-99877" }, { "date": "2021-11-19T00:00:00", "db": "VULMON", "id": "CVE-2021-41436" }, { "date": "2022-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "date": "2021-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "date": "2021-11-19T12:15:09.390000", "db": "NVD", "id": "CVE-2021-41436" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2021-99877" }, { "date": "2021-11-23T00:00:00", "db": "VULMON", "id": "CVE-2021-41436" }, { "date": "2022-11-15T07:17:00", "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "date": "2021-11-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "date": "2024-11-21T06:26:15.047000", "db": "NVD", "id": "CVE-2021-41436" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1643" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0ASUS\u00a0 In the product \u00a0HTTP\u00a0 Request Smuggling Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015289" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "environmental issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1643" } ], "trust": 0.6 } }
var-202309-0494
Vulnerability from variot
It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202309-0494", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax56u v2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_50460" }, { "model": "rt-ax55", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_50460" }, { "model": "rt-ac86u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4_386_51529" }, { "model": "rt-ac86u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u v2", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "db": "NVD", "id": "CVE-2023-39238" } ] }, "cve": "CVE-2023-39238", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "twcert@cert.org.tw", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-39238", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2023-011977", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "twcert@cert.org.tw", "id": "CVE-2023-39238", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2023-011977", "trust": 0.8, "value": "High" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "db": "NVD", "id": "CVE-2023-39238" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value\u00a0within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2023-39238" }, { "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "db": "VULMON", "id": "CVE-2023-39238" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-39238", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2023-011977", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-39238", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-39238" }, { "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "db": "NVD", "id": "CVE-2023-39238" } ] }, "id": "VAR-202309-0494", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.2879902 }, "last_update_date": "2024-08-14T15:36:46.328000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.0 }, { "problemtype": "Format string problem (CWE-134) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "db": "NVD", "id": "CVE-2023-39238" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://www.twcert.org.tw/tw/cp-132-7354-4e654-1.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-39238" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/134.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-39238" }, { "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "db": "NVD", "id": "CVE-2023-39238" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-39238" }, { "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "db": "NVD", "id": "CVE-2023-39238" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-07T00:00:00", "db": "VULMON", "id": "CVE-2023-39238" }, { "date": "2023-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "date": "2023-09-07T08:15:07.533000", "db": "NVD", "id": "CVE-2023-39238" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-07T00:00:00", "db": "VULMON", "id": "CVE-2023-39238" }, { "date": "2024-05-31T05:28:00", "db": "JVNDB", "id": "JVNDB-2023-011977" }, { "date": "2024-03-27T07:15:47.557000", "db": "NVD", "id": "CVE-2023-39238" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0ASUSTeK\u00a0Computer\u00a0Inc.\u00a0 Product Format String Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011977" } ], "trust": 0.8 } }
var-202309-0562
Vulnerability from variot
It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202309-0562", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax56u v2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_50460" }, { "model": "rt-ax55", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_50460" }, { "model": "rt-ac86u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4_386_51529" }, { "model": "rt-ac86u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u v2", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "db": "NVD", "id": "CVE-2023-39240" } ] }, "cve": "CVE-2023-39240", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "twcert@cert.org.tw", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2023-39240", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2023-011975", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "twcert@cert.org.tw", "id": "CVE-2023-39240", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2023-011975", "trust": 0.8, "value": "High" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "db": "NVD", "id": "CVE-2023-39240" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "\nIt is identified a format string vulnerability in ASUS RT-AX56U V2\u2019s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. ASUSTeK Computer Inc. of RT-AX55 firmware, RT-AX56U_V2 firmware, RT-AC86U A format string vulnerability exists in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2023-39240" }, { "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "db": "VULMON", "id": "CVE-2023-39240" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-39240", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2023-011975", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-39240", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-39240" }, { "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "db": "NVD", "id": "CVE-2023-39240" } ] }, "id": "VAR-202309-0562", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.2879902 }, "last_update_date": "2024-08-14T14:48:52.191000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.0 }, { "problemtype": "Format string problem (CWE-134) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "db": "NVD", "id": "CVE-2023-39240" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://www.twcert.org.tw/tw/cp-132-7356-021bf-1.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-39240" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/134.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-39240" }, { "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "db": "NVD", "id": "CVE-2023-39240" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-39240" }, { "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "db": "NVD", "id": "CVE-2023-39240" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-07T00:00:00", "db": "VULMON", "id": "CVE-2023-39240" }, { "date": "2023-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "date": "2023-09-07T08:15:07.710000", "db": "NVD", "id": "CVE-2023-39240" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-09-07T00:00:00", "db": "VULMON", "id": "CVE-2023-39240" }, { "date": "2024-05-31T05:30:00", "db": "JVNDB", "id": "JVNDB-2023-011975" }, { "date": "2024-03-27T07:15:48.047000", "db": "NVD", "id": "CVE-2023-39240" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0ASUSTeK\u00a0Computer\u00a0Inc.\u00a0 Product Format String Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-011975" } ], "trust": 0.8 } }
var-202111-1224
Vulnerability from variot
A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request. plural ASUS The product contains an improper restriction of excessive authentication attempts vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1224", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax88u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "tuf gaming ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86s", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "zenwifi ax \\", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax82u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax56u v2", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax92u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86u zaku ii edition", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "zenwifi xd6", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax56u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45911" }, { "model": "gt-ax11000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "tuf-ax5400", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax82u gundam edition", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax55", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u v2", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax82u gundam edition", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax86u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax3000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax82u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax86s", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "gt-ax11000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "NVD", "id": "CVE-2021-41435" } ] }, "cve": "CVE-2021-41435", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-41435", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-41435", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-41435", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-41435", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-41435", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202111-1641", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2021-41435", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-41435" }, { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "CNNVD", "id": "CNNVD-202111-1641" }, { "db": "NVD", "id": "CVE-2021-41435" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request. plural ASUS The product contains an improper restriction of excessive authentication attempts vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-41435" }, { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "VULMON", "id": "CVE-2021-41435" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41435", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015290", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1641", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-41435", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-41435" }, { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "CNNVD", "id": "CNNVD-202111-1641" }, { "db": "NVD", "id": "CVE-2021-41435" } ] }, "id": "VAR-202111-1224", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4178826414285714 }, "last_update_date": "2024-11-23T22:29:11.173000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RT-AX68U ASUS", "trust": 0.8, "url": "https://www.asus.com/jp/" }, { "title": "ASUS routers Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171129" }, { "title": "", "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-41435" }, { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "CNNVD", "id": "CNNVD-202111-1641" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-307", "trust": 1.0 }, { "problemtype": "Inappropriate limitation of excessive authentication attempts (CWE-307) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "NVD", "id": "CVE-2021-41435" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax56u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-ax-xt8-/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/all-series/rt-ax55/helpdesk_bios/" }, { "trust": 1.7, "url": "http://asus.com" }, { "trust": 1.7, "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax68u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-xd6/helpdesk_bios/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41435" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/307.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-41435" }, { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "CNNVD", "id": "CNNVD-202111-1641" }, { "db": "NVD", "id": "CVE-2021-41435" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2021-41435" }, { "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "db": "CNNVD", "id": "CNNVD-202111-1641" }, { "db": "NVD", "id": "CVE-2021-41435" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-19T00:00:00", "db": "VULMON", "id": "CVE-2021-41435" }, { "date": "2022-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "date": "2021-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1641" }, { "date": "2021-11-19T12:15:09.330000", "db": "NVD", "id": "CVE-2021-41435" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULMON", "id": "CVE-2021-41435" }, { "date": "2022-11-15T07:22:00", "db": "JVNDB", "id": "JVNDB-2021-015290" }, { "date": "2021-11-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1641" }, { "date": "2024-11-21T06:26:14.863000", "db": "NVD", "id": "CVE-2021-41435" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1641" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0ASUS\u00a0 Product Improper Limitation of Excessive Authentication Attempts Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015290" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1641" } ], "trust": 0.6 } }
var-202104-1666
Vulnerability from variot
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1666", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax55", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ax58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac85u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac1750 b1", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac88u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac5300", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac66u b1", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac1900", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac68p", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac3100", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax82u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac1900u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "zenwifi ax \\", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ax88u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac68w", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax55", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac1900p", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac2900", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac85u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac88u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ax68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac68rw", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac1750 b1", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac66u b1", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ax56u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac65u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac68r", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac68p", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac3100", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac68w", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax88u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac5300", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac1900", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac1900p", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac2900", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ax68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac68rw", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ax82u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ac68r", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "zenwifi ax \\", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax56u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac65u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "9.0.0.4.386.41994" }, { "model": "rt-ac1900u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" }, { "model": "rt-ax86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.42095" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-3128" } ] }, "cve": "CVE-2021-3128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-3128", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-3128", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-3128", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-652", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-3128", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-3128" }, { "db": "CNNVD", "id": "CNNVD-202104-652" }, { "db": "NVD", "id": "CVE-2021-3128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware \u003c 3.0.0.4.386.42095 or \u003c 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP\u0027s router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set", "sources": [ { "db": "NVD", "id": "CVE-2021-3128" }, { "db": "VULMON", "id": "CVE-2021-3128" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-3128", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202104-652", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-3128", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-3128" }, { "db": "CNNVD", "id": "CNNVD-202104-652" }, { "db": "NVD", "id": "CVE-2021-3128" } ] }, "id": "VAR-202104-1666", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5126495055 }, "last_update_date": "2024-11-23T22:47:39.136000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ASUS router Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147226" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-652" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-834", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-3128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac3100/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax55/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac1900p/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax88u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac68rw/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac65u/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-ax-xt8-/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax82u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac2900/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac1900u/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac1900/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax86u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac58u/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax58u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac86u/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac1750_b1/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax3000/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ac66u-b1/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax68u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac88u/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax56u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac5300/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac68w/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac68p/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac68u/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac68r/helpdesk_download/" }, { "trust": 1.7, "url": "https://www.asus.com/supportonly/rt-ac85u/helpdesk_download/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3128" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/834.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-3128" }, { "db": "CNNVD", "id": "CNNVD-202104-652" }, { "db": "NVD", "id": "CVE-2021-3128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2021-3128" }, { "db": "CNNVD", "id": "CNNVD-202104-652" }, { "db": "NVD", "id": "CVE-2021-3128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-12T00:00:00", "db": "VULMON", "id": "CVE-2021-3128" }, { "date": "2021-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-652" }, { "date": "2021-04-12T19:15:14.830000", "db": "NVD", "id": "CVE-2021-3128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-20T00:00:00", "db": "VULMON", "id": "CVE-2021-3128" }, { "date": "2021-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-652" }, { "date": "2024-11-21T06:20:56.883000", "db": "NVD", "id": "CVE-2021-3128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-652" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS RT-AX3000 Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-652" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-652" } ], "trust": 0.6 } }
var-202111-0625
Vulnerability from variot
ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames. plural ASUS Router product firmware contains a vulnerability related to interaction frequency control.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0625", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax55", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "gt-axe11000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "tuf-ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "tuf-ax3000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "gt-axe11000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax3000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "NVD", "id": "CVE-2021-37910" } ] }, "cve": "CVE-2021-37910", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-37910", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-37910", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "twcert@cert.org.tw", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "id": "CVE-2021-37910", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37910", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-37910", "trust": 1.0, "value": "MEDIUM" }, { "author": "twcert@cert.org.tw", "id": "CVE-2021-37910", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-37910", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202111-1140", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-37910", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37910" }, { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "CNNVD", "id": "CNNVD-202111-1140" }, { "db": "NVD", "id": "CVE-2021-37910" }, { "db": "NVD", "id": "CVE-2021-37910" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users\u0027 connections by sending specially crafted SAE authentication frames. plural ASUS Router product firmware contains a vulnerability related to interaction frequency control.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37910" }, { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "VULMON", "id": "CVE-2021-37910" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37910", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014873", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1140", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-37910", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37910" }, { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "CNNVD", "id": "CNNVD-202111-1140" }, { "db": "NVD", "id": "CVE-2021-37910" } ] }, "id": "VAR-202111-0625", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.40625 }, "last_update_date": "2024-08-14T14:55:45.698000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "top page", "trust": 0.8, "url": "https://www.asus.com/jp/" }, { "title": "ASUS routers Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170946" }, { "title": "", "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37910" }, { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "CNNVD", "id": "CNNVD-202111-1140" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-799", "trust": 1.0 }, { "problemtype": "Improper control of interaction frequency (CWE-799) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "NVD", "id": "CVE-2021-37910" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37910" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/799.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-37910" }, { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "CNNVD", "id": "CNNVD-202111-1140" }, { "db": "NVD", "id": "CVE-2021-37910" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2021-37910" }, { "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "db": "CNNVD", "id": "CNNVD-202111-1140" }, { "db": "NVD", "id": "CVE-2021-37910" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-12T00:00:00", "db": "VULMON", "id": "CVE-2021-37910" }, { "date": "2022-10-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "date": "2021-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1140" }, { "date": "2021-11-12T02:15:06.640000", "db": "NVD", "id": "CVE-2021-37910" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-17T00:00:00", "db": "VULMON", "id": "CVE-2021-37910" }, { "date": "2022-10-31T05:44:00", "db": "JVNDB", "id": "JVNDB-2021-014873" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1140" }, { "date": "2021-11-17T16:20:51.950000", "db": "NVD", "id": "CVE-2021-37910" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1140" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0ASUS\u00a0 Vulnerability related to interaction frequency control in router product firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014873" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1140" } ], "trust": 0.6 } }
var-202207-0160
Vulnerability from variot
ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device. ASUS RT-A88U is a wireless router from ASUS (ASUS) in Taiwan
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0160", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "zenwifi xd4s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi ac mini", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac58u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax86u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac87u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-acrh13", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n12vp b1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac66r", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac2400", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi pro et12", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac5300", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n12e c1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac55u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac68uf", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi xd6", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1300g\\+", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac2200", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac66u\\+", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac56s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax82u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1300uhp", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n12hp b1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac85u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1200g", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "tuf gaming ax3000 v2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac55uhp", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1750 b1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n14uhp", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac68u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac3100", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi pro xt12", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac51u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi et8", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax92u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac66w", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax68u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax58u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax55", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac3200", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi xt9", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rog rapture gt-ac5300", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1750", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac68r", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax3000", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rog rapture gt-ax11000", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax89x", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi xd5", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi ax hybrid", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac52u b1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1900", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n12\\+ b1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1200g\\+", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n66w", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi ax mini", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1200e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac2900", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac53", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac85p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n19", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac68w", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1200gu", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax56u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac51u\\+", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ax88u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n12d1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n66u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac65p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1900u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi ax", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "4g-ac68u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "zenwifi ac", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac57u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n18u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac68p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac86u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac65u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac66u b1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "4g-ac53u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac2600", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac87r", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-acrh17", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "tuf gaming ax5400", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n66r", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n12e b1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rog rapture gt-ac2900", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1200hp", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1900p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac56r", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac88u", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-ac1200", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-n66c1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.46061" }, { "model": "rt-a88u 3.0.0.4.386 45898", "scope": null, "trust": 0.6, "vendor": "asus", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "NVD", "id": "CVE-2021-43702" } ] }, "cve": "CVE-2021-43702", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "exploitabilityScore": 6.8, "id": "CVE-2021-43702", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2022-58229", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.3, "id": "CVE-2021-43702", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-43702", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-58229", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-389", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2021-43702", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "VULMON", "id": "CVE-2021-43702" }, { "db": "CNNVD", "id": "CNNVD-202207-389" }, { "db": "NVD", "id": "CVE-2021-43702" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device. ASUS RT-A88U is a wireless router from ASUS (ASUS) in Taiwan", "sources": [ { "db": "NVD", "id": "CVE-2021-43702" }, { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "VULMON", "id": "CVE-2021-43702" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-43702", "trust": 2.3 }, { "db": "CNVD", "id": "CNVD-2022-58229", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-389", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-43702", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "VULMON", "id": "CVE-2021-43702" }, { "db": "CNNVD", "id": "CNNVD-202207-389" }, { "db": "NVD", "id": "CVE-2021-43702" } ] }, "id": "VAR-202207-0160", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" } ], "trust": 1.2372652696875 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" } ] }, "last_update_date": "2024-08-14T15:27:14.485000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for ASUS RT-A88U Cross-Site Scripting Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/345646" }, { "title": "ASUS RT-A88U Fixes for cross-site scripting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=200692" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "CNNVD", "id": "CNNVD-202207-389" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-43702" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.kroll.com/en/insights/publications/cyber/cve-2021-43702-from-discovery-to-patch" }, { "trust": 1.7, "url": "https://www.asus.com/uk/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ac88u/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-43702/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "VULMON", "id": "CVE-2021-43702" }, { "db": "CNNVD", "id": "CNNVD-202207-389" }, { "db": "NVD", "id": "CVE-2021-43702" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "VULMON", "id": "CVE-2021-43702" }, { "db": "CNNVD", "id": "CNNVD-202207-389" }, { "db": "NVD", "id": "CVE-2021-43702" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-58229" }, { "date": "2022-07-05T00:00:00", "db": "VULMON", "id": "CVE-2021-43702" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-389" }, { "date": "2022-07-05T12:15:07.830000", "db": "NVD", "id": "CVE-2021-43702" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-58229" }, { "date": "2022-07-18T00:00:00", "db": "VULMON", "id": "CVE-2021-43702" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-389" }, { "date": "2022-07-18T15:27:57.557000", "db": "NVD", "id": "CVE-2021-43702" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-389" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUS RT-A88U Cross-Site Scripting Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2022-58229" }, { "db": "CNNVD", "id": "CNNVD-202207-389" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-389" } ], "trust": 0.6 } }
var-202207-2002
Vulnerability from variot
A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability. ASUSTeK Computer Inc. of ASUSWRT Products from other vendors have out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ASUS Asuswrt-Merlin is a firmware running in the routers of ASUS Corporation of Taiwan, China
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-2002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xd4", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48790" }, { "model": "asuswrt", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48706" }, { "model": "rt-ax55", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_49559" }, { "model": "xt9", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.388_20027" }, { "model": "xt12", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48823" }, { "model": "tuf-ax3000 v2", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48750" }, { "model": "xd6", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_49356" }, { "model": "new gen", "scope": "lt", "trust": 1.0, "vendor": "asuswrt merlin", "version": "386.7" }, { "model": "xt8", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48706" }, { "model": "gt-ax6000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48823" }, { "model": "rt-ax68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_49479" }, { "model": "rt-ax82u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_49380" }, { "model": "gt-ax11000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_49559" }, { "model": "rt-ax86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_49447" }, { "model": "gt-axe16000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48786" }, { "model": "rt-ax56u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_49559" }, { "model": "rt-ax58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48908" }, { "model": "et12", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48823" }, { "model": "gt-ax11000 pro", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386_48996" }, { "model": "gt-ax11000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "xt8", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax86u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "et12", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "xd6", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "xt12", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "new gen", "scope": null, "trust": 0.8, "vendor": "asuswrt merlin", "version": null }, { "model": "gt-ax11000 pro", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "xt9", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "gt-ax6000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "gt-axe16000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "asuswrt", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "xd4", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax68u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "tuf-ax3000 v2", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax82u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax58u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "db": "NVD", "id": "CVE-2022-26376" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Francesco Benvenuto of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2567" } ], "trust": 0.6 }, "cve": "CVE-2022-26376", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "talos-cna@cisco.com", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-26376", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-26376", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-26376", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "talos-cna@cisco.com", "id": "CVE-2022-26376", "trust": 1.0, "value": "MEDIUM" }, { "author": "nvd@nist.gov", "id": "CVE-2022-26376", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2022-26376", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202207-2567", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "db": "CNNVD", "id": "CNNVD-202207-2567" }, { "db": "NVD", "id": "CVE-2022-26376" }, { "db": "NVD", "id": "CVE-2022-26376" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability. ASUSTeK Computer Inc. of ASUSWRT Products from other vendors have out-of-bounds write vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ASUS Asuswrt-Merlin is a firmware running in the routers of ASUS Corporation of Taiwan, China", "sources": [ { "db": "NVD", "id": "CVE-2022-26376" }, { "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "db": "VULHUB", "id": "VHN-419844" }, { "db": "VULMON", "id": "CVE-2022-26376" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26376", "trust": 3.4 }, { "db": "TALOS", "id": "TALOS-2022-1511", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2022-014335", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-2567", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-419844", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-26376", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419844" }, { "db": "VULMON", "id": "CVE-2022-26376" }, { "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "db": "CNNVD", "id": "CNNVD-202207-2567" }, { "db": "NVD", "id": "CVE-2022-26376" } ] }, "id": "VAR-202207-2002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419844" } ], "trust": 0.6533004960000001 }, "last_update_date": "2024-08-14T13:21:54.991000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ASUS Asuswrt-Merlin Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203947" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2567" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419844" }, { "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "db": "NVD", "id": "CVE-2022-26376" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://talosintelligence.com/vulnerability_reports/talos-2022-1511" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26376" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26376/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419844" }, { "db": "VULMON", "id": "CVE-2022-26376" }, { "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "db": "CNNVD", "id": "CNNVD-202207-2567" }, { "db": "NVD", "id": "CVE-2022-26376" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419844" }, { "db": "VULMON", "id": "CVE-2022-26376" }, { "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "db": "CNNVD", "id": "CNNVD-202207-2567" }, { "db": "NVD", "id": "CVE-2022-26376" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-05T00:00:00", "db": "VULHUB", "id": "VHN-419844" }, { "date": "2022-08-05T00:00:00", "db": "VULMON", "id": "CVE-2022-26376" }, { "date": "2023-09-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "date": "2022-07-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2567" }, { "date": "2022-08-05T22:15:11.143000", "db": "NVD", "id": "CVE-2022-26376" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-02T00:00:00", "db": "VULHUB", "id": "VHN-419844" }, { "date": "2022-08-06T00:00:00", "db": "VULMON", "id": "CVE-2022-26376" }, { "date": "2023-09-15T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-014335" }, { "date": "2022-08-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2567" }, { "date": "2022-12-02T20:08:05.937000", "db": "NVD", "id": "CVE-2022-26376" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2567" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ASUSTeK\u00a0Computer\u00a0Inc.\u00a0 of \u00a0ASUSWRT\u00a0 Out-of-Bounds Write Vulnerability in Other Vendors\u0027 Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014335" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2567" } ], "trust": 0.6 } }