CVE-2021-44158

ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.44266:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:30

Type Values Removed Values Added
References () https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html - Third Party Advisory () https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html - Third Party Advisory

26 Jun 2023, 19:02

Type Values Removed Values Added
CWE CWE-787 CWE-1284

Information

Published : 2022-01-03 10:15

Updated : 2024-11-21 06:30


NVD link : CVE-2021-44158

Mitre link : CVE-2021-44158

CVE.ORG link : CVE-2021-44158


JSON object : View

Products Affected

asus

  • rt-ax56u_firmware
  • rt-ax56u
CWE
CWE-121

Stack-based Buffer Overflow

CWE-1284

Improper Validation of Specified Quantity in Input