ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31008 | ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service. |
Fixes
Solution
ASUS RT-AX56U firmware update version to 3.0.0.4.386.45898
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T16:52:58.821Z
Reserved: 2021-11-23T00:00:00
Link: CVE-2021-44158
No data.
Status : Modified
Published: 2022-01-03T10:15:08.190
Modified: 2024-11-21T06:30:27.930
Link: CVE-2021-44158
No data.
OpenCVE Enrichment
No data.
EUVD