ASUS AC68U <=3.0.0.4.385.20852 is affected by a buffer overflow in blocking.cgi, which may cause a denial of service (DoS).
References
Link | Resource |
---|---|
http://ac68u.com | Broken Link URL Repurposed |
http://asus.com | Vendor Advisory |
https://github.com/IBUILI/Asus | Exploit Third Party Advisory |
http://ac68u.com | Broken Link URL Repurposed |
http://asus.com | Vendor Advisory |
https://github.com/IBUILI/Asus | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://ac68u.com - Broken Link, URL Repurposed | |
References | () http://asus.com - Vendor Advisory | |
References | () https://github.com/IBUILI/Asus - Exploit, Third Party Advisory |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://ac68u.com - Broken Link, URL Repurposed |
Information
Published : 2022-03-23 11:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45757
Mitre link : CVE-2021-45757
CVE.ORG link : CVE-2021-45757
JSON object : View
Products Affected
asus
- rt-ac68u
- rt-ac68u_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')