CVE-2021-45756

Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.
References
Link Resource
http://asus.com Vendor Advisory
http://rt-ac68u.com Broken Link URL Repurposed
https://github.com/IBUILI/Asus Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*
cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*
cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-03-23 11:15

Updated : 2024-02-14 01:17


NVD link : CVE-2021-45756

Mitre link : CVE-2021-45756

CVE.ORG link : CVE-2021-45756


JSON object : View

Products Affected

asus

  • rt-ac68u_firmware
  • rt-ac5300_firmware
  • rt-ac5300
  • rt-ac68u
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')