CVE-2021-45756

Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.
References
Link Resource
http://asus.com Vendor Advisory
http://rt-ac68u.com Broken Link URL Repurposed
https://github.com/IBUILI/Asus Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://rt-ac68u.comĀ - Broken Link (MISC) http://rt-ac68u.comĀ - Broken Link, URL Repurposed

Information

Published : 2022-03-23 11:15

Updated : 2024-02-28 19:09


NVD link : CVE-2021-45756

Mitre link : CVE-2021-45756

CVE.ORG link : CVE-2021-45756


JSON object : View

Products Affected

asus

  • rt-ac68u_firmware
  • rt-ac5300
  • rt-ac68u
  • rt-ac5300_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')