Asus Rt-Ax56U Firmware vulnerabilities
12 known vulnerabilities affecting asus/rt-ax56u_firmware.
Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH8MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2021-40556HIGHCVSS 8.8v3.0.0.4.386.442662022-10-06
CVE-2021-40556 [HIGH] CWE-787 CVE-2021-40556: A stack overflow vulnerability exists in the httpd service in ASUS RT-AX56U Router Version 3.0.0.4.3
A stack overflow vulnerability exists in the httpd service in ASUS RT-AX56U Router Version 3.0.0.4.386.44266. This vulnerability is caused by the strcat function called by "caupload" input handle function allowing the user to enter 0xFFFF bytes into the stack. This vulnerability allows an attacker to execute commands remotely. The vulnerability requir
nvd
CVE-2022-26376CRITICALCVSS 9.8fixed in 3.0.0.4.386_495592022-08-05
CVE-2022-26376 [CRITICAL] CWE-787 CVE-2022-26376: A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0
A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
nvd
CVE-2021-43702CRITICALCVSS 9.0v3.0.0.4.386.460612022-07-05
CVE-2021-43702 [CRITICAL] CWE-79 CVE-2021-43702: ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin pa
ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device.
nvd
CVE-2022-23973HIGHCVSS 8.8v3.0.0.4.386.458982022-04-07
CVE-2022-23973 [HIGH] CWE-787 CVE-2022-23973: ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due
ASUS RT-AX56U’s user profile configuration function is vulnerable to stack-based buffer overflow due to insufficient validation for parameter length. An unauthenticated LAN attacker can execute arbitrary code to perform arbitrary operations or disrupt service.
nvd
CVE-2022-23972HIGHCVSS 8.8v3.0.0.4.386.458982022-04-07
CVE-2022-23972 [HIGH] CWE-89 CVE-2022-23972: ASUS RT-AX56U’s SQL handling function has an SQL injection vulnerability due to insufficient user in
ASUS RT-AX56U’s SQL handling function has an SQL injection vulnerability due to insufficient user input validation. An unauthenticated LAN attacker to inject arbitrary SQL code to read, modify and delete database.
nvd
CVE-2022-23971HIGHCVSS 8.1v3.0.0.4.386.458982022-04-07
CVE-2022-23971 [HIGH] CWE-22 CVE-2022-23971: ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filterin
ASUS RT-AX56U’s update_PLC/PORT file has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another PLC/PORT file with the same file name, which results in service disruption.
nvd
CVE-2022-23970HIGHCVSS 8.1v3.0.0.4.386.458982022-04-07
CVE-2022-23970 [HIGH] CWE-22 CVE-2022-23970: ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filterin
ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another file with the same file name, which results in service disruption.
nvd
CVE-2022-22054MEDIUMCVSS 6.5v3.0.0.4.386.442662022-01-14
CVE-2022-22054 [MEDIUM] CWE-22 CVE-2022-22054: ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filteri
ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.
nvd
CVE-2021-44158HIGHCVSS 8.0v3.0.0.4.386.442662022-01-03
CVE-2021-44158 [HIGH] CWE-121 CVE-2021-44158: ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation f
ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
nvd
CVE-2021-41435CRITICALCVSS 9.8fixed in 3.0.0.4.386.458982021-11-19
CVE-2021-41435 [CRITICAL] CWE-307 CVE-2021-41435: A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-
A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) bef
nvd
CVE-2021-41436HIGHCVSS 7.5fixed in 3.0.0.4.386.458982021-11-19
CVE-2021-41436 [HIGH] CWE-444 CVE-2021-41436: An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-
An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.3
nvd
CVE-2021-3128HIGHCVSS 7.5fixed in 3.0.0.4.386.42095fixed in 9.0.0.4.386.419942021-04-12
CVE-2021-3128 [HIGH] CWE-834 CVE-2021-3128: In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination
nvd