Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.
References
Link | Resource |
---|---|
http://asus.com | Vendor Advisory |
http://rt-ac68u.com | Broken Link URL Repurposed |
https://github.com/IBUILI/Asus | Exploit Third Party Advisory |
http://asus.com | Vendor Advisory |
http://rt-ac68u.com | Broken Link URL Repurposed |
https://github.com/IBUILI/Asus | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://asus.com - Vendor Advisory | |
References | () http://rt-ac68u.com - Broken Link, URL Repurposed | |
References | () https://github.com/IBUILI/Asus - Exploit, Third Party Advisory |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://rt-ac68u.com - Broken Link, URL Repurposed |
Information
Published : 2022-03-23 11:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45756
Mitre link : CVE-2021-45756
CVE.ORG link : CVE-2021-45756
JSON object : View
Products Affected
asus
- rt-ac5300
- rt-ac68u
- rt-ac5300_firmware
- rt-ac68u_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')