Asus Rt-Ax55 Firmware vulnerabilities

14 known vulnerabilities affecting asus/rt-ax55_firmware.

Total CVEs
14
CISA KEV
1
actively exploited
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH10MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2023-41347HIGHCVSS 8.8v3.0.0.4.386.515982023-11-03
CVE-2023-41347 [HIGH] CWE-78 CVE-2023-41347: ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of spec ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.
nvd
CVE-2023-41348HIGHCVSS 8.8v3.0.0.4.386.515982023-11-03
CVE-2023-41348 [HIGH] CWE-78 CVE-2023-41348: ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of spec ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its code-authentication module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.
nvd
CVE-2023-41345HIGHCVSS 8.8v3.0.0.4.386.515982023-11-03
CVE-2023-41345 [HIGH] CWE-78 CVE-2023-41345: ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of spec ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-generated module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system, or terminate services.
nvd
CVE-2023-41346HIGHCVSS 8.8v3.0.0.4.386.515982023-11-03
CVE-2023-41346 [HIGH] CWE-78 CVE-2023-41346: ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of spec ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.
nvd
CVE-2023-39780HIGHCVSS 8.8KEVv3.0.0.4.386.515982023-09-11
CVE-2023-39780 [HIGH] CWE-78 CVE-2023-39780: On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347;
nvd
CVE-2023-39238HIGHCVSS 7.2v3.0.0.4.386_504602023-09-07
CVE-2023-39238 [HIGH] CWE-134 CVE-2023-39238: It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
nvd
CVE-2023-39240HIGHCVSS 7.2v3.0.0.4.386_504602023-09-07
CVE-2023-39240 [HIGH] CWE-134 CVE-2023-39240: It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. Thi It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operatio
nvd
CVE-2023-39239HIGHCVSS 7.2v3.0.0.4.386_504602023-09-07
CVE-2023-39239 [HIGH] CWE-134 CVE-2023-39239: It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vul It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt s
nvd
CVE-2022-26376CRITICALCVSS 9.8fixed in 3.0.0.4.386_495592022-08-05
CVE-2022-26376 [CRITICAL] CWE-787 CVE-2022-26376: A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0 A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
nvd
CVE-2021-43702CRITICALCVSS 9.0v3.0.0.4.386.460612022-07-05
CVE-2021-43702 [CRITICAL] CWE-79 CVE-2021-43702: ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin pa ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device.
nvd
CVE-2021-41435CRITICALCVSS 9.8fixed in 3.0.0.4.386.458982021-11-19
CVE-2021-41435 [CRITICAL] CWE-307 CVE-2021-41435: A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT- A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) bef
nvd
CVE-2021-41436HIGHCVSS 7.5fixed in 3.0.0.4.386.458982021-11-19
CVE-2021-41436 [HIGH] CWE-444 CVE-2021-41436: An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT- An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.3
nvd
CVE-2021-37910MEDIUMCVSS 5.3fixed in 3.0.0.4.386.458982021-11-12
CVE-2021-37910 [LOW] CWE-799 CVE-2021-37910: ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames.
nvd
CVE-2021-3128HIGHCVSS 7.5fixed in 3.0.0.4.386.42095fixed in 9.0.0.4.386.419942021-04-12
CVE-2021-3128 [HIGH] CWE-834 CVE-2021-3128: In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42 In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination
nvd