ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-01-03 10:15
Updated : 2023-06-26 19:02
NVD link : CVE-2021-44158
Mitre link : CVE-2021-44158
CVE.ORG link : CVE-2021-44158
JSON object : View
Products Affected
asus
- rt-ax56u_firmware
- rt-ax56u