var-202111-1223
Vulnerability from variot
An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet. plural ASUS The product has HTTP There is a vulnerability related to request smuggling.Service operation interruption (DoS) It may be in a state. ASUS routers is a router from ASUS, Taiwan, China.
ASUS routers has a security vulnerability. The vulnerability stems from a problem with the router firmware verifying HTTP data packets. Unauthenticated remote attackers can use this vulnerability to perform denial of service attacks by sending specially crafted HTTP data packets
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1223", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rt-ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax88u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "tuf gaming ax3000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86s", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "zenwifi ax \\", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax82u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax56u v2", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax92u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax86u zaku ii edition", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "zenwifi xd6", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax56u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax68u", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45911" }, { "model": "gt-ax11000", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "tuf-ax5400", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax82u gundam edition", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax55", "scope": "lt", "trust": 1.0, "vendor": "asus", "version": "3.0.0.4.386.45898" }, { "model": "rt-ax58u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u v2", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax82u gundam edition", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax55", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax86u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax3000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax56u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax82u", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "rt-ax86s", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "gt-ax11000", "scope": null, "trust": 0.8, "vendor": "asustek computer", "version": null }, { "model": "routers", "scope": null, "trust": 0.6, "vendor": "asus", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "cve": "CVE-2021-41436", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-41436", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-99877", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-41436", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-41436", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-41436", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-41436", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-99877", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1643", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-41436", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet. plural ASUS The product has HTTP There is a vulnerability related to request smuggling.Service operation interruption (DoS) It may be in a state. ASUS routers is a router from ASUS, Taiwan, China. \n\r\n\r\nASUS routers has a security vulnerability. The vulnerability stems from a problem with the router firmware verifying HTTP data packets. Unauthenticated remote attackers can use this vulnerability to perform denial of service attacks by sending specially crafted HTTP data packets", "sources": [ { "db": "NVD", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41436", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-015289", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-99877", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1643", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-41436", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "id": "VAR-202111-1223", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" } ], "trust": 1.09064731125 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" } ] }, "last_update_date": "2024-11-23T22:33:00.034000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RT-AX68U ASUS", "trust": 0.8, "url": "https://www.asus.com/jp/" }, { "title": "Patch for ASUS routers environmental issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/305656" }, { "title": "ASUS routers Remediation measures for environmental problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=171131" }, { "title": "", "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-444", "trust": 1.0 }, { "problemtype": "HTTP Request Smuggling (CWE-444) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41436" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax56u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax3000/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-ax-xt8-/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/all-series/rt-ax55/helpdesk_bios/" }, { "trust": 1.7, "url": "http://asus.com" }, { "trust": 1.7, "url": "https://rog.asus.com/networking/rog-rapture-gt-ax11000-model/helpdesk_bios" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/wifi-routers/asus-wifi-routers/rt-ax68u/helpdesk_bios/" }, { "trust": 1.7, "url": "https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-xd6/helpdesk_bios/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/444.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/efchatz/easy-exploits" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-99877" }, { "db": "VULMON", "id": "CVE-2021-41436" }, { "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "db": "NVD", "id": "CVE-2021-41436" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2021-99877" }, { "date": "2021-11-19T00:00:00", "db": "VULMON", "id": "CVE-2021-41436" }, { "date": "2022-11-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "date": "2021-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "date": "2021-11-19T12:15:09.390000", "db": "NVD", "id": "CVE-2021-41436" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2021-99877" }, { "date": "2021-11-23T00:00:00", "db": "VULMON", "id": "CVE-2021-41436" }, { "date": "2022-11-15T07:17:00", "db": "JVNDB", "id": "JVNDB-2021-015289" }, { "date": "2021-11-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1643" }, { "date": "2024-11-21T06:26:15.047000", "db": "NVD", "id": "CVE-2021-41436" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1643" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0ASUS\u00a0 In the product \u00a0HTTP\u00a0 Request Smuggling Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015289" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "environmental issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1643" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.