In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
References
Link Providers
https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/ cve-icon cve-icon
https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/ cve-icon cve-icon
https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/ cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2021-04-12T17:41:07

Updated: 2024-08-03T16:45:51.264Z

Reserved: 2021-01-12T00:00:00

Link: CVE-2021-3128

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-12T19:15:14.830

Modified: 2024-11-21T06:20:56.883

Link: CVE-2021-3128

cve-icon Redhat

No data.