CVE-2021-44158

ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.44266:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*

History

26 Jun 2023, 19:02

Type Values Removed Values Added
CWE CWE-787 CWE-1284

Information

Published : 2022-01-03 10:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-44158

Mitre link : CVE-2021-44158

CVE.ORG link : CVE-2021-44158


JSON object : View

Products Affected

asus

  • rt-ax56u
  • rt-ax56u_firmware
CWE
CWE-1284

Improper Validation of Specified Quantity in Input

CWE-121

Stack-based Buffer Overflow