ASUS RT-AX56U Router - Stack-based buffer overflow

CVE-2021-44158

8HIGH

Key Information

Vendor
Asus
Status
Rt-ax56u
Vendor
CVE Published:
3 January 2022

Summary

ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.

Affected Version(s)

RT-AX56U = 3.0.0.4.386.44266

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.