ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html - Third Party Advisory |
26 Jun 2023, 19:02
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1284 |
Information
Published : 2022-01-03 10:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44158
Mitre link : CVE-2021-44158
CVE.ORG link : CVE-2021-44158
JSON object : View
Products Affected
asus
- rt-ax56u_firmware
- rt-ax56u