Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.
References
| Link | Resource |
|---|---|
| http://asus.com | Vendor Advisory |
| http://rt-ac68u.com | Broken Link URL Repurposed |
| https://github.com/IBUILI/Asus | Exploit Third Party Advisory |
| http://asus.com | Vendor Advisory |
| http://rt-ac68u.com | Broken Link URL Repurposed |
| https://github.com/IBUILI/Asus | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://asus.com - Vendor Advisory | |
| References | () http://rt-ac68u.com - Broken Link, URL Repurposed | |
| References | () https://github.com/IBUILI/Asus - Exploit, Third Party Advisory |
14 Feb 2024, 01:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://rt-ac68u.com - Broken Link, URL Repurposed |
29 Mar 2022, 17:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:* cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
| CWE | CWE-120 | |
| References | (MISC) http://asus.com - Vendor Advisory | |
| References | (MISC) http://rt-ac68u.com - Broken Link | |
| References | (MISC) https://github.com/IBUILI/Asus - Exploit, Third Party Advisory |
23 Mar 2022, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-03-23 11:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45756
Mitre link : CVE-2021-45756
CVE.ORG link : CVE-2021-45756
JSON object : View
Products Affected
asus
- rt-ac68u
- rt-ac68u_firmware
- rt-ac5300_firmware
- rt-ac5300
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
